Sciweavers

55 search results - page 7 / 11
» worm 2004
Sort
View
CC
2004
Springer
127views System Software» more  CC 2004»
14 years 26 days ago
Analyzing Memory Accesses in x86 Executables
This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of the work is to recover intermediate representations that are similar to those that can be c...
Gogul Balakrishnan, Thomas W. Reps
MDM
2004
Springer
14 years 24 days ago
Obstacles to the Adoption of Mobile Agents
The idea of mobile software agents has inspired many researchers ever since the term was coined probably by Jim White of General Magic around 1994, although the principal idea is ...
Volker Roth
PSB
2004
13 years 8 months ago
Motif Discovery in Heterogeneous Sequence Data
This paper introduces the first integrated algorithm designed to discover novel motifs in heterogeneous sequence data, which is comprised of coregulated genes from a single genome...
Amol Prakash, Mathieu Blanchette, Saurabh Sinha, M...
CN
2004
106views more  CN 2004»
13 years 7 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
NDSS
2005
IEEE
14 years 1 months ago
The Internet Motion Sensor - A Distributed Blackhole Monitoring System
As national infrastructure becomes intertwined with emerging global data networks, the stability and integrity of the two have become synonymous. This connection, while necessary,...
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose ...