Sciweavers

1092 search results - page 182 / 219
» Do summaries help
Sort
View
140
Voted
NDSS
2009
IEEE
15 years 10 months ago
Scalable, Behavior-Based Malware Clustering
Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a m...
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hla...
145
Voted
RTSS
2009
IEEE
15 years 10 months ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 10 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
ICIDS
2009
Springer
15 years 10 months ago
Say Anything: A Demonstration of Open Domain Interactive Digital Storytelling
Say Anything is a text-based interactive digital storytelling application that differs from other systems in its emphasis on the ability of users to create a narrative in any domai...
Reid Swanson, Andrew S. Gordon
145
Voted
OOPSLA
2009
Springer
15 years 10 months ago
A concurrent dynamic analysis framework for multicore hardware
Software has spent the bounty of Moore’s law by solving harder problems and exploiting abstractions, such as highlevel languages, virtual machine technology, binary rewritdynami...
Jungwoo Ha, Matthew Arnold, Stephen M. Blackburn, ...