Sciweavers

240 search results - page 24 / 48
» Detection of MMORPG bots based on behavior analysis
Sort
View
CCS
2008
ACM
13 years 10 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
WACV
2012
IEEE
12 years 3 months ago
LOST: Longterm Observation of Scenes (with Tracks)
We introduce the Longterm Observation of Scenes (with Tracks) dataset. This dataset comprises videos taken from streaming outdoor webcams, capturing the same half hour, each day, ...
Austin Abrams, Jim Tucek, Joshua Little, Nathan Ja...
VLDB
2005
ACM
153views Database» more  VLDB 2005»
14 years 8 months ago
An effective and efficient algorithm for high-dimensional outlier detection
Abstract. The outlier detection problem has important applications in the field of fraud detection, network robustness analysis, and intrusion detection. Most such applications are...
Charu C. Aggarwal, Philip S. Yu
ATAL
2008
Springer
13 years 10 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
DATE
2002
IEEE
96views Hardware» more  DATE 2002»
14 years 26 days ago
Modeling Techniques and Tests for Partial Faults in Memory Devices
: It has always been assumed that fault models in memories are sufficiently precise for specifying the faulty behavior. This means that, given a fault model, it should be possible...
Zaid Al-Ars, A. J. van de Goor