Sciweavers

1737 search results - page 251 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
NDSS
2008
IEEE
15 years 9 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
139
Voted
BMCBI
2006
157views more  BMCBI 2006»
15 years 2 months ago
Comparison of protein interaction networks reveals species conservation and divergence
Background: Recent progresses in high-throughput proteomics have provided us with a first chance to characterize protein interaction networks (PINs), but also raised new challenge...
Zhi Liang, Meng Xu, Maikun Teng, Liwen Niu
124
Voted
MVA
1996
109views Computer Vision» more  MVA 1996»
15 years 3 months ago
Image Features Based on a Mixed Fractal Model and Evaluation of Their Effectiveness in Image Retrieval
Many research works on content-based image retrieval have made use of image features. On the other hand, many kinds of image features have also been developed in the research fiel...
Toshinori Hayashi, Yuzuru Tanaka
126
Voted
LCN
2005
IEEE
15 years 8 months ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...
119
Voted
IEEEPACT
2006
IEEE
15 years 8 months ago
Whole-program optimization of global variable layout
On machines with high-performance processors, the memory system continues to be a performance bottleneck. Compilers insert prefetch operations and reorder data accesses to improve...
Nathaniel McIntosh, Sandya Mannarswamy, Robert Hun...