Sciweavers

1424 search results - page 128 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
WWW
2009
ACM
14 years 9 months ago
Link based small sample learning for web spam detection
Robust statistical learning based web spam detection system often requires large amounts of labeled training data. However, labeled samples are more difficult, expensive and time ...
Guanggang Geng, Qiudan Li, Xinchang Zhang
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
14 years 5 days ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 2 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
ICECCS
2002
IEEE
99views Hardware» more  ICECCS 2002»
14 years 1 months ago
Using Role-Based Modeling Language (RBML) to Characterize Model Families
Cost-effective development of large, integrated computer-based systems can be realized through systematic reuse of development experiences throughout the development process. In t...
Dae-Kyoo Kim, Robert B. France, Sudipto Ghosh, Eun...
COMCOM
2007
103views more  COMCOM 2007»
13 years 8 months ago
MPEG-21 digital items to support integration of heterogeneous multimedia content
The MELISA system is a distributed platform for multi-platform sports content broadcasting, providing end users with a wide range of real-time interactive services during the spor...
Kostas Karpouzis, Ilias Maglogiannis, Emmanuel Pap...