Sciweavers

323 search results - page 52 / 65
» Improving the Detection of Unknown Computer Worms Activity U...
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
IJMMS
2007
79views more  IJMMS 2007»
13 years 8 months ago
Incorporating tutoring principles into interactive knowledge acquisition
This paper argues that interactive knowledge acquisition systems would benefit from a tighter and more thorough incorporation of tutoring and learning principles. Current acquisit...
Jihie Kim, Yolanda Gil
CVPR
2008
IEEE
14 years 10 months ago
Trajectory analysis and semantic region modeling using a nonparametric Bayesian model
We propose a novel nonparametric Bayesian model, Dual Hierarchical Dirichlet Processes (Dual-HDP), for trajectory analysis and semantic region modeling in surveillance settings, i...
Xiaogang Wang, Keng Teck Ma, Gee Wah Ng, W. Eric L...
BMCBI
2007
145views more  BMCBI 2007»
13 years 8 months ago
Colony size measurement of the yeast gene deletion strains for functional genomics
Background: Numerous functional genomics approaches have been developed to study the model organism yeast, Saccharomyces cerevisiae, with the aim of systematically understanding t...
Negar Memarian, Matthew Jessulat, Javad Alirezaie,...
CCS
2003
ACM
14 years 1 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson