Sciweavers

1437 search results - page 209 / 288
» Content Extraction Signatures
Sort
View
ISSTA
2004
ACM
14 years 3 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
ACSAC
2003
IEEE
14 years 1 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
CCS
2008
ACM
13 years 12 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
BMCBI
2008
158views more  BMCBI 2008»
13 years 10 months ago
Analyzing M-CSF dependent monocyte/macrophage differentiation: Expression modes and meta-modes derived from an independent compo
Background: The analysis of high-throughput gene expression data sets derived from microarray experiments still is a field of extensive investigation. Although new approaches and ...
Dominik Lutter, Peter Ugocsai, Margot Grandl, Evel...
BMCBI
2010
181views more  BMCBI 2010»
13 years 10 months ago
Intensity dependent estimation of noise in microarrays improves detection of differentially expressed genes
Background: In many microarray experiments, analysis is severely hindered by a major difficulty: the small number of samples for which expression data has been measured. When one ...
Amit Zeisel, Amnon Amir, Wolfgang J. Köstler,...