Sciweavers

77 search results - page 8 / 16
» Protecting Mobile Agents Against Malicious Hosts
Sort
View
ACSAC
2010
IEEE
13 years 4 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
CSDA
2008
147views more  CSDA 2008»
13 years 6 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
WSC
2001
13 years 8 months ago
Supply chain agent decision aid system (SCADAS)
Supply chain decisions are improved with access to global information. However, supply chain partners are frequently hesitant to provide full access to all the information within ...
Anurag Gupta, Larry Whitman, Ramesh K. Agarwal
CN
2007
137views more  CN 2007»
13 years 6 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
USS
2008
13 years 9 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian