Sciweavers

2655 search results - page 504 / 531
» Event Systems and Access Control
Sort
View
DIMVA
2010
13 years 10 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
BMCBI
2010
232views more  BMCBI 2010»
13 years 8 months ago
LucidDraw: Efficiently visualizing complex biochemical networks within MATLAB
Background: Biochemical networks play an essential role in systems biology. Rapidly growing network data and e research activities call for convenient visualization tools to aid i...
Sheng He, Juan Mei, Guiyang Shi, Zhengxiang Wang, ...
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 8 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
JSAC
2006
155views more  JSAC 2006»
13 years 8 months ago
Cross-Layer Optimized Video Streaming Over Wireless Multihop Mesh Networks
Abstract--The proliferation of wireless multihop communication infrastructures in office or residential environments depends on their ability to support a variety of emerging appli...
Yiannis Andreopoulos, Nicholas Mastronarde, Mihael...
JECR
2002
120views more  JECR 2002»
13 years 8 months ago
Strategic Connectivity in Extended Enterprise Networks
Extended enterprises are networks of organizations interconnected to exchange critical resources, such as raw materials, labor, access to markets, specialized skills and knowledge...
John Tillquist