Sciweavers

207 search results - page 7 / 42
» Expressive Subgroup Signatures
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 1 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
BMCBI
2008
77views more  BMCBI 2008»
13 years 8 months ago
A simple and robust method for connecting small-molecule drugs using gene-expression signatures
Background: Interaction of a drug or chemical with a biological system can result in a geneexpression profile or signature characteristic of the event. Using a suitably robust alg...
Shu-Dong Zhang, Timothy W. Gant
ANCS
2007
ACM
13 years 12 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
BIOTECHNO
2008
IEEE
14 years 2 months ago
Grouping Levels of Exposure with Same Observable Effects before Class Prediction in Toxicogenomics
—Gene expression profiling in toxicogenomics is often used to find molecular signature of toxicants. The range of doses chosen in toxicogenomics studies does not always represe...
Vincent Guillemot, Cathy Philippe, Arthur Tenenhau...
ASIACRYPT
2000
Springer
14 years 7 days ago
Key Improvements to XTR
Abstract. This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR ...
Arjen K. Lenstra, Eric R. Verheul