Sciweavers

3451 search results - page 532 / 691
» Collaborative attack modeling
Sort
View
ISSTA
2012
ACM
11 years 11 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
CVPR
2005
IEEE
14 years 11 months ago
Automatic 3D to 2D Registration for the Photorealistic Rendering of Urban Scenes
This paper presents a novel and efficient algorithm for the 3D range to 2D image registration problem in urban scene settings. Our input is a set of unregistered 3D range scans an...
Lingyun Liu, Ioannis Stamos
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
14 years 9 months ago
Real-time ranking with concept drift using expert advice
In many practical applications, one is interested in generating a ranked list of items using information mined from continuous streams of data. For example, in the context of comp...
Hila Becker, Marta Arias
CHI
2008
ACM
14 years 9 months ago
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
Many popular web browsers now include active phishing warnings since research has shown that passive warnings are often ignored. In this laboratory study we examine the effectiven...
Serge Egelman, Lorrie Faith Cranor, Jason I. Hong
ICCAD
2005
IEEE
81views Hardware» more  ICCAD 2005»
14 years 6 months ago
Kauffman networks: analysis and applications
Abstract— A Kauffman network is an abstract model of gene regulatory networks. Each gene is represented by a vertex. An edge from one vertex to another implies that the former ge...
Elena Dubrova, Maxim Teslenko, Andrés Marti...