Sciweavers

2135 search results - page 40 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
WICOMM
2011
13 years 2 months ago
A pragmatic approach to area coverage in hybrid wireless sensor networks
Success of Wireless Sensor Networks (WSN) largely depends on whether the deployed network can provide desired area coverage with acceptable network lifetime. This paper seeks to a...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
CJ
2010
131views more  CJ 2010»
13 years 5 months ago
Probabilistic Approaches to Estimating the Quality of Information in Military Sensor Networks
an be used to abstract away from the physical reality by describing it as components that exist in discrete states with probabilistically invoked actions that change the state. The...
Duncan Gillies, David Thornley, Chatschik Bisdikia...
BMCBI
2008
123views more  BMCBI 2008»
13 years 8 months ago
Validation of protein models by a neural network approach
Background: The development and improvement of reliable computational methods designed to evaluate the quality of protein models is relevant in the context of protein structure re...
Paolo Mereghetti, Maria Luisa Ganadu, Elena Papale...
NDSS
2007
IEEE
14 years 2 months ago
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...