Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
This article presents a new system for automatically constructing and training radial basis function networks based on original evolutionary computing methods. This system, called...
This paper proposes a new target detection method in low contrast forward looking infrared (FLIR) images. Automatic detection of small targets in remotely sensed images is a diffic...
In recent years, both hashing-based similarity search and multimodal similarity search have aroused much research interest in the data mining and other communities. While hashing-...
Bad error handling is the cause of many service outages. We address this problem by a novel approach to detect and patch bad error handling automatically. Our approach uses error ...