Sciweavers

326 search results - page 7 / 66
» Testing malware detectors
Sort
View
GECCO
2005
Springer
113views Optimization» more  GECCO 2005»
14 years 1 months ago
Estimating the detector coverage in a negative selection algorithm
This paper proposes a statistical mechanism to analyze the detector coverage in a negative selection algorithm, namely a quantitative measurement of a detector set’s capability ...
Zhou Ji, Dipankar Dasgupta
RAID
2010
Springer
13 years 6 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
ISMIS
2005
Springer
14 years 1 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
CIARP
2007
Springer
14 years 1 months ago
Robust Color Contour Object Detection Invariant to Shadows
In this work a new robust color and contour based object detection method in images with varying shadows is presented. The method relies on a physics-based contour detector that em...
Jorge Scandaliaris, Michael Villamizar, Juan Andra...
VTS
2005
IEEE
151views Hardware» more  VTS 2005»
14 years 1 months ago
A CMOS RF RMS Detector for Built-in Testing of Wireless Transceivers
: This project involves the design of a CMOS RF RMS Detector that converts the RMS voltage amplitude of an RF signal to a DC voltage. Its high input impedance and small area make i...
Alberto Valdes-Garcia, Radhika Venkatasubramanian,...