Sciweavers

2292 search results - page 350 / 459
» Techniques and tools for dynamic optimization
Sort
View
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
14 years 2 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
RAID
2007
Springer
14 years 2 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
UML
2005
Springer
14 years 1 months ago
Enhancement of Development Technologies for Agent-Based Software Engineering
Abstract. Current trends in software development show a move towards supporting autonomous components (agents). The accurate timing of interactions between such components is growi...
Andre Karpistsenko
LCTRTS
2001
Springer
14 years 21 days ago
Middleware For Building Adaptive Systems Via Configuration
1 COTS (commercial off-the-shelf) devices are capable of executing powerful, distributed algorithms. Very large, adaptive systems can be created by simply integrating these devices...
Sanjai Narain, Ravichander Vaidyanathan, Stanley M...
CGA
2004
13 years 8 months ago
Browsers to Support Awareness and Social Interaction
feel abstract and informational rather than inviting for social interaction. Consequently, newcomers and occasional visitors to such sites cannot quickly assess who the participant...
Alison Lee, Andreas Girgensohn, Jun Zhang