Sciweavers

4820 search results - page 25 / 964
» Implementing Signatures for C
Sort
View
DSN
2008
IEEE
14 years 2 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...
ISPASS
2009
IEEE
14 years 2 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
13 years 11 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
KDD
2010
ACM
182views Data Mining» more  KDD 2010»
13 years 11 months ago
Extracting temporal signatures for comprehending systems biology models
Naren Sundaravaradan, K. S. M. Tozammel Hossain, V...
BMCBI
2007
74views more  BMCBI 2007»
13 years 7 months ago
A feature selection approach for identification of signature genes from SAGE data
Junior Barrera, Roberto Marcondes Cesar Junior, Ca...