Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Abstract. The testing of anomaly detectors is considered from the perspective of a Multi-objective Evolutionary Exploit Generator (EEG). Such a framework provides users of anomaly ...
When it is impractical to rigorously assess all parts of complex systems, test engineers use defect detectors to focus their limited resources. In this article, we define some pr...
Tim Menzies, Justin S. Di Stefano, Kareem Ammar, K...
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
This paper presents a robust adaptive goodness-of-fit (GOF) χ2 test event detector for non-intrusive load monitoring applications. We derive a closed form for the decision thres...
Yuanwei Jin, Eniye Tebekaemi, Mario Berges, Lucio ...