Sciweavers

293 search results - page 30 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis
—Malicious software is rampant on the Internet and costs billions of dollars each year. Safe and thorough analysis of malware is key to protecting vulnerable systems and cleaning...
Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha...
ATAL
2007
Springer
14 years 1 months ago
An adversarial environment model for bounded rational agents in zero-sum interactions
Multiagent environments are often not cooperative nor collaborative; in many cases, agents have conflicting interests, leading to adversarial interactions. This paper presents a ...
Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschei...
BIOCOMP
2007
13 years 9 months ago
Interaction Models for Biochemical Reactions
Abstract—This paper presents a stochastic modelling framework for complex biochemical reaction networks from a component-based perspective. Our approach takes into account the di...
Mila E. Majster-Cederbaum, Nils Semmelrock, Verena...
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
13 years 6 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
VIS
2009
IEEE
399views Visualization» more  VIS 2009»
14 years 8 months ago
Visual Human+Machine Learning
In this paper we describe a novel method to integrate interactive visual analysis and machine learning to support the insight generation of the user. The suggested approach combine...
Raphael Fuchs, Jürgen Waser, Meister Eduard GrÃ...