Sciweavers

112 search results - page 14 / 23
» Behavior based software theft detection
Sort
View
EDBTW
2006
Springer
13 years 11 months ago
Context Consistency Management Using Ontology Based Model
Abstract. Inconsistent contexts are death-wounds which usually result in contextaware applications' incongruous behaviors and users' perplexed feelings, therefore the ben...
Yingyi Bu, Shaxun Chen, Jun Li, XianPing Tao, Jian...
FATES
2004
Springer
14 years 28 days ago
A Test Generation Framework for quiescent Real-Time Systems
We present an extension of Tretmans’ theory and algorithm for test generation for input-output transition systems to real-time systems. Our treatment is based on an operational i...
Laura Brandán Briones, Ed Brinksma
CORR
2011
Springer
184views Education» more  CORR 2011»
13 years 2 months ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom
MICRO
2009
IEEE
128views Hardware» more  MICRO 2009»
14 years 2 months ago
mSWAT: low-cost hardware fault detection and diagnosis for multicore systems
Continued technology scaling is resulting in systems with billions of devices. Unfortunately, these devices are prone to failures from various sources, resulting in even commodity...
Siva Kumar Sastry Hari, Man-Lap Li, Pradeep Ramach...
ACSAC
2010
IEEE
13 years 5 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...