Sciweavers

420 search results - page 58 / 84
» Using static analysis for Ajax intrusion detection
Sort
View
ACSAC
2007
IEEE
14 years 1 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
RAID
1999
Springer
13 years 11 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
WIMOB
2007
IEEE
14 years 1 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
KBSE
2006
IEEE
14 years 1 months ago
Reverse Engineering of Design Patterns from Java Source Code
Recovering design patterns can enhance existing source code analysis tools by bringing program understanding to the design level. This paper presents a new, fully automated patter...
Nija Shi, Ronald A. Olsson
TSP
2008
118views more  TSP 2008»
13 years 7 months ago
Maximum-Likelihood Detection of Orthogonal Space-Time Block Coded OFDM in Unknown Block Fading Channels
For orthogonal space-time block coded orthogonal frequency division multiplexing (OSTBC-OFDM) systems, many of the existing blind detection and channel estimation methods rely on t...
Tsung-Hui Chang, Wing-Kin Ma, Chong-Yung Chi