نتایج جستجو برای: malicious

تعداد نتایج: 12653  

Journal: :Theoretical Computer Science 2009

Journal: :Proceedings of the ACM on measurement and analysis of computing systems 2022

Due to the surging popularity of various cryptocurrencies in recent years, a large number browser extensions have been developed as portals access relevant services, such cryptocurrency exchanges and wallets. This has stimulated wild growth themed malicious that cause heavy financial losses users legitimate service providers. They shown their capability evading stringent vetting processes exten...

2008
Sinjae Lee Shaojian Zhu Yanggon Kim Juno Chang

A malicious peer’s behavior is one of the most challenging research areas of the P2P world. Our previous reputation-based trust model approach, which is based on the resource chain model (RCM), prevents malicious peers from spreading malicious contents among the open community. Moreover, a study on the malicious behavior over P2P community leads us to recognize a malicious node. The purpose of ...

2008
Jiang Wang Anup K. Ghosh Yih Huang

Malicious Web content poses a serious threat to the Internet, organizations and users. Current approaches to detecting malicious Web content employ high-powered honey clients to scan the Web for potentially malicious pages. These approaches, while effective at detecting malicious content, have the drawbacks of being few and far between, presenting a single snapshot in time of very dynamic pheno...

Journal: :J. UCS 2015
Junho Choi Chang Choi Ilsun You Pankoo Kim

The majority of existing malware detection techniques detects malicious codes by identifying malicious behavior patterns. However, they have difficulty identifying new or modified malicious behaviors; consequently, new techniques that can effectively and accurately detect new malicious behaviors are crucial. This paper proposes a method that defines the malicious behaviors of malware using conc...

2008
Michael Heller

As well known, the b-boundaries of the closed Friedman world model and of Schwarzschild solution consist of a single point. We study this phenomenon in a broader context of differential and structured spaces. We show that it is an equivalence relation ρ, defined on the Cauchy completed total space Ē of the frame bundle over a given space-time, that is responsible for this pathology. A singulari...

Journal: :CoRR 2016
Ming Pang Wei Gao Min Tao Zhi-Hua Zhou

Recommender system has attracted much attention during the past decade, and many attack detection algorithms have been developed for better recommendation. Most previous approaches focus on the shilling attacks, where the attack organizer fakes a large number of user profiles by the same strategy to promote or demote an item. In this paper, we study a different attack style: unorganized malicio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید