Sciweavers

2940 search results - page 67 / 588
» Behavioral Constraints for Services
Sort
View
DSN
2008
IEEE
14 years 4 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...
HT
2007
ACM
14 years 2 months ago
Simplifying web traversals by recognizing behavior patterns
Web sites must often service a wide variety of clients. Thus, it is inevitable that a web site will allow some visitors to find their information quickly while other visitors have...
Christian Doerr, Daniel von Dincklage, Amer Diwan
DIMVA
2007
13 years 11 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
APCCM
2004
13 years 11 months ago
On the Road to Behavior-Based Integration
Integration of autonomous object-oriented systems requires the integration of object structure and object behaviour. Research in federated information systems has so far mainly ad...
Markus Stumptner, Michael Schrefl, Georg Grossmann
CORR
2007
Springer
75views Education» more  CORR 2007»
13 years 10 months ago
Outage Behavior of Discrete Memoryless Channels Under Channel Estimation Errors
Classically, communication systems are designed assuming perfect channel state information at the receiver and/or transmitter. However, in many practical situations, only an estim...
Pablo Piantanida, Gerald Matz, Pierre Duhamel