Sciweavers

3511 search results - page 553 / 703
» Evaluation Methods for Groupware Systems
Sort
View
DIMVA
2009
13 years 9 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
13 years 8 months ago
Superstate identification for state machines using search-based clustering
State machines are a popular method of representing a syshigh level of abstraction that enables developers to gain an overview of the system they represent and quickly understand ...
Mathew Hall, Phil McMinn, Neil Walkinshaw
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 8 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
ENVSOFT
2007
88views more  ENVSOFT 2007»
13 years 8 months ago
Resampling-based software for estimating optimal sample size
The SISSI program implements a novel approach for the estimation of the optimal sample size in experimental data collection. It provides avisual evaluation system of sample size d...
Roberto Confalonieri, Marco Acutis, Gianni Bellocc...
FTCGV
2007
511views more  FTCGV 2007»
13 years 8 months ago
Image and Video Matting: A Survey
Matting refers to the problem of accurate foreground estimation in images and video. It is one of the key techniques in many image editing and film production applications, thus ...
Jue Wang, Michael F. Cohen