San Jose State University

Displaying 1-7 of 7 results

  • White Papers // Dec 2012

    Structural Entropy and Metamorphic Malware

    "Metamorphic malware is capable of changing its internal structure without altering its functionality. A common signature is nonexistent in highly metamorphic malware and, consequently, such malware can remain undetected under signature scanning. In this paper, the authors apply previous paper on structural entropy to the metamorphic detection problem. This technique...

    Provided By San Jose State University

  • White Papers // Aug 2012

    Chi-Squared Distance and Metamorphic Virus Detection

    "Metamorphic malware changes its internal structure with each generation, while maintaining its original behavior. Current commercial antivirus software generally scans for known malware signatures; therefore, they are not able to detect metamorphic malware that sufficiently morphs its internal structure. Machine learning methods such as Hidden Markov Models (HMMs) have shown...

    Provided By San Jose State University

  • White Papers // May 2011

    Detecting Undetectable Metamorphic Viruses

    "Signature-based detection provides a relatively simple and efficient method for detecting known viruses. At present, most antivirus systems rely primarily on signature detection. Metamorphic viruses are potentially one of the most difficult types of viruses to detect. Such viruses change their internal structure, which provides an effective means of avoiding...

    Provided By San Jose State University

  • White Papers // Dec 2010

    Quantitative Analysis Of The Price Discovery In The NAFTA Stock Markets

    In this paper the author extends the work of Chukwuogor-Ndu and Kasibhatla (2007) who document the co-integration among the United States (US), Canadian and Mexican financial markets. The author examines the question which is the leading market in the price formation in the North American Free Trade Agreement (NAFTA) financial...

    Provided By San Jose State University

  • White Papers // Dec 2010

    Handoff Management for Mobile Agents in High Speed Wireless Networks

    This paper presents analytical handoff management for multimedia users in a high speed wireless mobile network. The authors demonstrate the performance of handoffs with mobility consideration using several metrics including the alteration of states prior to reaching a cell boundary, the speed of mobile terminal, and the distance between a...

    Provided By San Jose State University

  • White Papers // May 2010

    How Smart Is Your Android Smartphone?

    Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers. A virus or worm that spreads over the network to cell phone users could be particularly damaging. Due to a rising demand for secure mobile phones, manufacturers...

    Provided By San Jose State University

  • White Papers // Feb 2010

    Creating Online Brand Value Through Online Discussion Sites

    This paper discusses the implications of the new evolving Service-Dominant (S-D) logic in marketing on brand value creation. Furthermore, it introduces the concept of online brand value and examines whether online discussion sites constitute a means for firms to co-create, together with a firm's customers, online brand value. A conceptual...

    Provided By San Jose State University

  • White Papers // Dec 2012

    Structural Entropy and Metamorphic Malware

    "Metamorphic malware is capable of changing its internal structure without altering its functionality. A common signature is nonexistent in highly metamorphic malware and, consequently, such malware can remain undetected under signature scanning. In this paper, the authors apply previous paper on structural entropy to the metamorphic detection problem. This technique...

    Provided By San Jose State University

  • White Papers // May 2011

    Detecting Undetectable Metamorphic Viruses

    "Signature-based detection provides a relatively simple and efficient method for detecting known viruses. At present, most antivirus systems rely primarily on signature detection. Metamorphic viruses are potentially one of the most difficult types of viruses to detect. Such viruses change their internal structure, which provides an effective means of avoiding...

    Provided By San Jose State University

  • White Papers // Aug 2012

    Chi-Squared Distance and Metamorphic Virus Detection

    "Metamorphic malware changes its internal structure with each generation, while maintaining its original behavior. Current commercial antivirus software generally scans for known malware signatures; therefore, they are not able to detect metamorphic malware that sufficiently morphs its internal structure. Machine learning methods such as Hidden Markov Models (HMMs) have shown...

    Provided By San Jose State University

  • White Papers // May 2010

    How Smart Is Your Android Smartphone?

    Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers. A virus or worm that spreads over the network to cell phone users could be particularly damaging. Due to a rising demand for secure mobile phones, manufacturers...

    Provided By San Jose State University

  • White Papers // Feb 2010

    Creating Online Brand Value Through Online Discussion Sites

    This paper discusses the implications of the new evolving Service-Dominant (S-D) logic in marketing on brand value creation. Furthermore, it introduces the concept of online brand value and examines whether online discussion sites constitute a means for firms to co-create, together with a firm's customers, online brand value. A conceptual...

    Provided By San Jose State University

  • White Papers // Dec 2010

    Quantitative Analysis Of The Price Discovery In The NAFTA Stock Markets

    In this paper the author extends the work of Chukwuogor-Ndu and Kasibhatla (2007) who document the co-integration among the United States (US), Canadian and Mexican financial markets. The author examines the question which is the leading market in the price formation in the North American Free Trade Agreement (NAFTA) financial...

    Provided By San Jose State University

  • White Papers // Dec 2010

    Handoff Management for Mobile Agents in High Speed Wireless Networks

    This paper presents analytical handoff management for multimedia users in a high speed wireless mobile network. The authors demonstrate the performance of handoffs with mobility consideration using several metrics including the alteration of states prior to reaching a cell boundary, the speed of mobile terminal, and the distance between a...

    Provided By San Jose State University