Sciweavers

240 search results - page 19 / 48
» Detection of MMORPG bots based on behavior analysis
Sort
View
IEEEIAS
2009
IEEE
14 years 2 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
RAID
2010
Springer
13 years 6 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
ISCAS
2008
IEEE
113views Hardware» more  ISCAS 2008»
14 years 2 months ago
Stability study of the TCP-RED system using detrended fluctuation analysis
— It has been observed that the TCP-RED system may exhibit instability and oscillatory behavior. Control methods proposed in the past have been based on the analytical models tha...
Xi Chen, Siu Chung Wong, Chi Kong Tse, Ljiljana Tr...
ASPDAC
2007
ACM
144views Hardware» more  ASPDAC 2007»
13 years 12 months ago
Control-Flow Aware Communication and Conflict Analysis of Parallel Processes
In this paper, we present an approach for control-flow aware communication and conflict analysis of systems of parallel communicating processes. This approach allows to determine ...
Axel Siebenborn, Alexander Viehl, Oliver Bringmann...
BMCBI
2011
13 years 2 months ago
The PathOlogist: An Automated Tool for Pathway-Centric Analysis
Background: The PathOlogist is a new tool designed to transform large sets of gene expression data into quantitative descriptors of pathway-level behavior. The tool aims to provid...
Sharon I. Greenblum, Sol Efroni, Carl F. Schaefer,...