Sciweavers

1804 search results - page 289 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ICTAI
2008
IEEE
14 years 3 months ago
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces
Frequent patterns in program executions represent recurring sequences of events. These patterns can be used to reveal the hidden structures of a program, and ease the comprehensio...
Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang
CCS
2009
ACM
14 years 3 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
DEXAW
2006
IEEE
127views Database» more  DEXAW 2006»
14 years 3 months ago
History Checking of XML Data Streams
Besides being adopted as the new general data representation format for the Internet, XML is finding increasing acceptance as a native data exchange language. In order to fully e...
Alessandro Campi, Paola Spoletini
ICPR
2010
IEEE
14 years 2 months ago
A Neurobiologically Motivated Stochastic Method for Analysis of Human Activities in Video
In this paper, we develop a neurobiologicallymotivated statistical method for video analysis that simultaneously searches the combined motion and form space in a concerted and ef...
Ricky Sethi, Amit Roy-Chowdhury
BMCBI
2010
132views more  BMCBI 2010»
13 years 9 months ago
Parallel multiplicity and error discovery rate (EDR) in microarray experiments
Background: In microarray gene expression profiling experiments, differentially expressed genes (DEGs) are detected from among tens of thousands of genes on an array using statist...
Wayne Wenzhong Xu, Clay J. Carter