The power of comparative reasoning

J Yagnik, D Strelow, DA Ross… - … Conference on Computer …, 2011 - ieeexplore.ieee.org
Rank correlation measures are known for their resilience to perturbations in numeric values
and are widely used in many evaluation metrics. Such ordinal measures have rarely been …

Cybercrime: Understanding and addressing the concerns of stakeholders

N Martin, J Rice - Computers & Security, 2011 - Elsevier
Cybercrime and cybercriminal activities continue to impact communities as the steady
growth of electronic information systems enables more online business. The collective views …

Experience, comfort, and privacy concerns: antecedents of online spending

DF Spake, R Zachary Finney, M Joseph - Journal of Research in …, 2011 - emerald.com
Purpose–The purpose of this paper is to examine antecedents of consumer online
spending. Design/methodology/approach–A sample of 766 college students in the USA …

[PDF][PDF] Computer virus detection using features ranking and machine learning

A Altaher, S Ramadass, A Ali - Australian Journal of Basic and Applied …, 2011 - Citeseer
Computer virus is a computer program that can copy itself and infect a computer, computer
virus have become an increasingly important problem that threatens the security of computer …

Detecting, validating and characterizing computer infections in the wild

E Raftopoulos, X Dimitropoulos - Proceedings of the 2011 ACM …, 2011 - dl.acm.org
Although network intrusion detection systems (IDSs) have been studied for several years,
their operators are still overwhelmed by a large number of false-positive alerts. In this work …

Real time network anomaly detection using relative entropy

A Altaher, S Ramadass… - … Conference on High …, 2011 - ieeexplore.ieee.org
As the computer networks continue to increase in size, complexity and importance, the
network security issue becomes more and more important. In this paper, we propose a real …

改进贝叶斯算法在未知恶意软件识别中的研究

赖英旭, 杨震 - 北京工业大学学报, 2011 - journal.bjut.edu.cn
为改进朴素贝叶斯(naive Bayes, NB) 算法在识别未知恶意代码过程中学习速度慢的缺点,
在分析研究朴素贝叶斯算法, 复合贝叶斯(multi-naive Bayes, MNB) 算法的基础上 …

[PDF][PDF] An efficient technique for detection of suspicious malicious web site

KP Kumar, N Jaisankar, N Mythili - Journal of Advances in …, 2011 - academia.edu
In today's web world web sites became attackers' main target. Since days before virus
signatures had been used to detect malicious web pages. In this paper the malicious web …

Hunting Distributed Malware with the κ-Calculus

M Dalla Preda, C Di Giusto - International Symposium on Fundamentals of …, 2011 - Springer
The defense of computer systems from malicious software attacks, such as viruses and
worms, is a key aspect of computer security. The analogy between malicious software and …

A dual stack IPv4/IPv6 testbed for malware detection in IPv6 networks

A Altaher, S Ramadass, A Ali - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
The exhaustion of IPv4 addresses on November 2011 has made the future of the internet in
the IPv6 and raised new challenges in the network security research. This paper proposed a …