Sciweavers

103 search results - page 9 / 21
» Microsoft's new window on security
Sort
View
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
14 years 2 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
EUROSEC
2009
ACM
14 years 4 months ago
Application-based TCP hijacking
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data ...
Oliver Zheng, Jason Poon, Konstantin Beznosov
VIROLOGY
2008
87views more  VIROLOGY 2008»
13 years 9 months ago
OpenDocument and Open XML security (OpenOffice.org and MS Office 2007)
OpenDocument and Open XML are both new open file formats for office documents. OpenDocument is an ISO standard, promoted by OpenOffice.org and Sun StarOffice. Open XML is the new f...
Philippe Lagadec
SOUPS
2005
ACM
14 years 3 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
SAC
2009
ACM
14 years 4 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura