Sciweavers

817 search results - page 18 / 164
» Malware behaviour analysis
Sort
View
CCR
2004
80views more  CCR 2004»
13 years 7 months ago
An analysis of TCP reset behaviour on the internet
This paper presents a one-year study of Internet packet traffic from a large campus network, showing that 15-25% of TCP connections have at least one TCP RST (reset). Similar resu...
Martin F. Arlitt, Carey L. Williamson
ACSAC
2005
IEEE
14 years 1 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
CCS
2011
ACM
12 years 7 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
ICPR
2008
IEEE
14 years 8 months ago
Analysis of human behaviour in front of a target scene
In this paper we present an application of computer vision techniques to obtain specific information about the behaviour of the people passing in front of a target scene. This is ...
Adel Lablack, Chabane Djeraba
LREC
2010
156views Education» more  LREC 2010»
13 years 8 months ago
Heterogeneous Sensor Database in Support of Human Behaviour Analysis in Unrestricted Environments: The Audio Part
In the present paper we report on a recent effort that resulted in the establishment of a unique multimodal database, referred to as the PROMETHEUS database. This database was cre...
Stavros Ntalampiras, Todor Ganchev, Ilyas Potamiti...