Sciweavers

817 search results - page 24 / 164
» Malware behaviour analysis
Sort
View
MIRAGE
2007
Springer
14 years 2 months ago
Copying Behaviour of Expressive Motion
Abstract. In this paper we present an agent that can analyse certain human fullbody movements in order to respond in an expressive manner with copying behaviour. Our work focuses o...
Maurizio Mancini, Ginevra Castellano, Elisabetta B...
CLEF
2009
Springer
13 years 6 months ago
Overview of iCLEF 2009: Exploring Search Behaviour in a Multilingual Folksonomy Environment
This paper summarises activities from the iCLEF 2009 task. As in 2008, the task was organised based on users participating in an interactive cross-language image search experiment...
Julio Gonzalo, Víctor Peinado, Paul Clough,...
IRI
2006
IEEE
14 years 2 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
TRUST
2010
Springer
14 years 1 months ago
Axiomatic and Behavioural Trust
Academic discourse on trust is fractured along disciplinary lines. Security theorists routinely use a definition of trust which, apparently, has little in common with any of the d...
Clark D. Thomborson
USS
2008
13 years 10 months ago
Hypervisor Support for Identifying Covertly Executing Binaries
Hypervisors have been proposed as a security tool to defend against malware that subverts the OS kernel. However, hypervisors must deal with the semantic gap between the low-level...
Lionel Litty, H. Andrés Lagar-Cavilla, Davi...