Sciweavers

817 search results - page 21 / 164
» Malware behaviour analysis
Sort
View
FTDCS
1997
IEEE
13 years 11 months ago
Analysing the behaviour of distributed software architectures: a case study
A Software Architecture is the overall structure of a system in terms of its constituent components and their interconnections. In this paper, we describe work to associate behavi...
Jeff Magee, Jeff Kramer, Dimitra Giannakopoulou
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 1 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
KI
2007
Springer
14 years 1 months ago
Analysing Movement and Behavioural Patterns of Laboratory Mice in a Semi Natural Environment Based on Data collected via RFID-Te
In this paper we present a continuous 24 hour data collection and a semi automated data analysis of laboratory mice in a spacious indoor environment. The data is collected via an R...
Mareike Kritzler, Lars Lewejohann, Antonio Krü...
PRL
2006
207views more  PRL 2006»
13 years 7 months ago
On-line trajectory clustering for anomalous events detection
In this paper we propose a trajectory clustering algorithm suited for video surveillance systems. Trajectories are clustered on-line, as the data are collected, and clusters are o...
Claudio Piciarelli, Gian Luca Foresti
KI
2007
Springer
14 years 1 months ago
Extracting Patterns of Individual Movement Behaviour from a Massive Collection of Tracked Positions
A EU-funded project GeoPKDD develops methods and tools for analysis of massive collections of movement data, which describe changes of spatial positions of discrete entities. Withi...
Gennady L. Andrienko, Natalia V. Andrienko