In this paper, rational cubic and bicubic trigonometric schemes are developed to conserve monotonicity of curve and surface data respectively. The rational cubic function has four parameters in each subinterval, while, the rational bicubic partially blended function has eight parameters in each rectangular patch. The monotonicity of curve and surface ...Download Now
In this paper, the authors present a novel framework - it uses the information in kernel structures of a process - to do run-time analysis of the behavior of an executing program. Their analysis shows that classifying a process as malicious or benign - using the information in the kernel ...Download Now
Linux malware can pose a significant threat - its (Linux) penetration is exponentially increasing - because little is known or understood about its vulnerabilities. The authors believe that now is the right time to devise non-signature based zero-day (previously unknown) malware detection strategies before Linux intruders take them by surprise. ...Download Now
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. This hidden malcode can be remotely executed using a simple trigger program. It has been shown that embedded malware is not detected by commercial antivirus software even when the malware signature is ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?