Sciweavers

817 search results - page 22 / 164
» Malware behaviour analysis
Sort
View
TELSYS
2010
132views more  TELSYS 2010»
13 years 3 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
ADCM
2007
93views more  ADCM 2007»
13 years 8 months ago
Spectral behaviour of GMRES applied to singular systems
The purpose of this paper is to develop a spectral analysis of the Hessenberg matrix obtained by the GMRES algorithm used for solving a linear system with a singular matrix. We pr...
Laurent Smoch
KBSE
2008
IEEE
14 years 2 months ago
MTSA: The Modal Transition System Analyser
Modal Transition Systems (MTS) are operational models that distinguish between required and proscribed behaviour of the system to be and behaviour which it is not yet known whethe...
Nicolás D'Ippolito, Dario Fischbein, Marsha...
ENTCS
2008
82views more  ENTCS 2008»
13 years 8 months ago
A Static Analysis for Beta-Binders
We introduce a Control Flow Analysis, that statically approximates the dynamic behaviour of processes, expressed in the Beta-Binders calculus. Our analysis of a system is able to ...
Chiara Bodei
ECAL
2005
Springer
14 years 2 months ago
Timescale and Stability in Adaptive Behaviour
Recently, in both the neuroscience and adaptive behaviour communities, there has been growing interest in the interplay of multiple timescales within neural systems. In particular,...
Christopher L. Buckley, Seth Bullock, Netta Cohen