Sciweavers

205 search results - page 4 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
DATE
2010
IEEE
156views Hardware» more  DATE 2010»
14 years 16 days ago
Domain specific architecture for next generation wireless communication
—In order to solve the challenges in processor design for the next generation wireless communication systems, this paper first proposes a system level design flow for communicati...
Botao Zhang, Hengzhu Liu, Heng Zhao, Fangzheng Mo,...
ISI
2005
Springer
14 years 28 days ago
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
Experiments were conducted to test several hypotheses on methods for improving document classification for the malicious insider threat problem within the Intelligence Community. ...
Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balas...
USS
2010
13 years 5 months ago
Automatic Generation of Remediation Procedures for Malware Infections
Despite the widespread deployment of malwaredetection software, in many situations it is difficult to preemptively block a malicious program from infecting a system. Rather, signa...
Roberto Paleari, Lorenzo Martignoni, Emanuele Pass...
FAC
2010
140views more  FAC 2010»
13 years 4 months ago
From a domain analysis to the specification and detection of code and design smells
Code and design smells are recurring design problems in software systems that must be identified to avoid their possible negative consequences on development and maintenance. Conse...
Naouel Moha, Yann-Gaël Guéhéneu...
JMM2
2007
127views more  JMM2 2007»
13 years 7 months ago
The Cut Detection Issue in the Animation Movie Domain
— In this paper we are proposing an improved cut detection algorithm adapted to the animation movies domain. A cut is the direct concatenation of two different shots and produces...
Bogdan Ionescu, Patrick Lambert, Didier Coquin, Va...