Sciweavers

1225 search results - page 167 / 245
» The Instance Complexity Conjecture
Sort
View
DSN
2008
IEEE
14 years 3 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...
ACISP
2008
Springer
14 years 3 months ago
Collisions for Round-Reduced LAKE
LAKE is a family of cryptographic hash functions presented at FSE 2008. It is an iterated hash function and defines two main instances with a 256 bit and 512 bit hash value. In th...
Florian Mendel, Martin Schläffer
ADBIS
2008
Springer
131views Database» more  ADBIS 2008»
14 years 3 months ago
Increasing Expressiveness of Composite Events Using Parameter Contexts
The event-condition-action paradigm (also known as triggers or ECA rules) gives a database “active” capabilities – the ability to react automatically to changes in the databa...
Indrakshi Ray, Wei Huang
CSFW
2007
IEEE
14 years 3 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
ICDE
2007
IEEE
179views Database» more  ICDE 2007»
14 years 3 months ago
A New ILP-based Concept Discovery Method for Business Intelligence
In this work, we propose a multi-relational concept discovery method for business intelligence applications. Multi-relational data mining finds interesting patterns that span ove...
Seda Daglar Toprak, Pinar Senkul, Yusuf Kavurucu, ...