University of Balamand

Displaying 1-10 of 10 results

  • White Papers // May 2013

    Malware Detection Based on Structural and Behavioural Features of API Calls

    In this paper, the authors propose a five-step approach to detect obfuscated malware by investigating the structural and behavioral features of API calls. They have developed a fully automated system to disassemble and extract API call features effectively from executables. Using n-gram statistical analysis of binary content, they are able...

    Provided By University of Balamand

  • White Papers // Sep 2012

    Cloud Computing a Research Roadmap in Coalescence With Software Engineering

    The new concept of cloud computing with on-demand provisioning of a shared pool of configurable computing resources of unprecedented size, elastic scalability and ubiquitous network service accessibility has gained huge momentum in the IT industry. However, there are many issues faced in migrating existing systems into the cloud that have...

    Provided By University of Balamand

  • White Papers // Aug 2012

    SMEs and the Economic Growth: A Comparative Study of Clustering Techniques in SMEs Data Analysis

    Regional economic planning of Small-to-Medium Enterprises (SMEs) requires a thorough understanding of the industry structure and the size of business. The main body of the literature regarding SMEs is focused on formation and growth, as well as success and failure. Some studies have considered clustering regional areas based on functional...

    Provided By University of Balamand

  • White Papers // Jun 2011

    Cybercrime: The Case of Obfuscated Malware

    Cybercrime has rapidly developed in recent years and mal-ware is one of the major security threats in computer which have been in existence from the very early days. There is a lack of understanding of such malware threats and what mechanisms can be used in implementing security prevention as well...

    Provided By University of Balamand

  • White Papers // Apr 2011

    A New Fault Injection Approach to Study the Impact of Bitflips in the Configuration of SRAM-Based FPGAs

    A new method for injecting faults in the configuration bits of SRAM-based FPGAs is proposed. The main advantages over previous methods are its ability to simultaneously inject several faults or bit-flips in the FPGA by "Pipelining" the fault injection process. The design to be tested is divided into modules. The...

    Provided By University of Balamand

  • White Papers // Aug 2010

    Towards Understanding Malware Behaviour by the Extraction of API Calls

    One of the recent trends adopted by malware authors is to use packers or software tools that instigate code obfuscation in order to evade detection by antivirus scanners. With evasion techniques such as polymorphism and metamorphism malware is able to fool current detection techniques. Thus, security researchers and the anti-virus...

    Provided By University of Balamand

  • White Papers // Jun 2009

    Improved Root-Mean-Square-Gain-Combining for SIMO Channels

    The major problem that wireless communication systems undergo is multipath fading caused by scattering of the transmitted signal. However, the authors can treat multipath propagation as multiple channels between the transmitter and receiver to improve the signal-to-scattering-noise ratio. While using Single Input Multiple Output (SIMO) systems, the diversity receivers extract...

    Provided By University of Balamand

  • White Papers // Jun 2009

    Least Square-SVM Detector for Wireless BPSK in Multi-Environmental Noise

    Support Vector Machine (SVM) is a statistical learning tool developed to a more complex concept of Structural Risk Minimization (SRM). In this paper, SVM is applied to signal detection in communication systems in the presence of channel noise in various environments in the form of Rayleigh fading, Additive White Gaussian...

    Provided By University of Balamand

  • White Papers // Mar 2009

    Above the Nominal Limit Performance Evaluation of Multiwavelength Optical Code-Division Multiple-Access Systems

    The authors provide an analysis for the performance of a Multi-Wave-length Optical Code-Division Multiple-Access (MW-OCDMA) network when the system is working above the nominal transmission rate limit imposed by passive encoding-decoding operation. They address the problem of overlapping in such a system and how it can directly affect the Bit...

    Provided By University of Balamand

  • White Papers // Jan 2009

    An Expert System Methodology for SMEs and NPOs

    Traditionally Expert Systems (ES) require a full analysis of the business problem by a Knowledge Engineer (KE) to develop a solution. This inherently makes ES technology very expensive and beyond the affordability of the majority of Small and Medium sized Enterprises (SMEs) and Non-Profit Organisations (NPOs). Therefore, SMEs and NPOs...

    Provided By University of Balamand

  • White Papers // Apr 2011

    A New Fault Injection Approach to Study the Impact of Bitflips in the Configuration of SRAM-Based FPGAs

    A new method for injecting faults in the configuration bits of SRAM-based FPGAs is proposed. The main advantages over previous methods are its ability to simultaneously inject several faults or bit-flips in the FPGA by "Pipelining" the fault injection process. The design to be tested is divided into modules. The...

    Provided By University of Balamand

  • White Papers // Jun 2009

    Least Square-SVM Detector for Wireless BPSK in Multi-Environmental Noise

    Support Vector Machine (SVM) is a statistical learning tool developed to a more complex concept of Structural Risk Minimization (SRM). In this paper, SVM is applied to signal detection in communication systems in the presence of channel noise in various environments in the form of Rayleigh fading, Additive White Gaussian...

    Provided By University of Balamand

  • White Papers // Jun 2009

    Improved Root-Mean-Square-Gain-Combining for SIMO Channels

    The major problem that wireless communication systems undergo is multipath fading caused by scattering of the transmitted signal. However, the authors can treat multipath propagation as multiple channels between the transmitter and receiver to improve the signal-to-scattering-noise ratio. While using Single Input Multiple Output (SIMO) systems, the diversity receivers extract...

    Provided By University of Balamand

  • White Papers // Mar 2009

    Above the Nominal Limit Performance Evaluation of Multiwavelength Optical Code-Division Multiple-Access Systems

    The authors provide an analysis for the performance of a Multi-Wave-length Optical Code-Division Multiple-Access (MW-OCDMA) network when the system is working above the nominal transmission rate limit imposed by passive encoding-decoding operation. They address the problem of overlapping in such a system and how it can directly affect the Bit...

    Provided By University of Balamand

  • White Papers // Jan 2009

    An Expert System Methodology for SMEs and NPOs

    Traditionally Expert Systems (ES) require a full analysis of the business problem by a Knowledge Engineer (KE) to develop a solution. This inherently makes ES technology very expensive and beyond the affordability of the majority of Small and Medium sized Enterprises (SMEs) and Non-Profit Organisations (NPOs). Therefore, SMEs and NPOs...

    Provided By University of Balamand

  • White Papers // Aug 2010

    Towards Understanding Malware Behaviour by the Extraction of API Calls

    One of the recent trends adopted by malware authors is to use packers or software tools that instigate code obfuscation in order to evade detection by antivirus scanners. With evasion techniques such as polymorphism and metamorphism malware is able to fool current detection techniques. Thus, security researchers and the anti-virus...

    Provided By University of Balamand

  • White Papers // May 2013

    Malware Detection Based on Structural and Behavioural Features of API Calls

    In this paper, the authors propose a five-step approach to detect obfuscated malware by investigating the structural and behavioral features of API calls. They have developed a fully automated system to disassemble and extract API call features effectively from executables. Using n-gram statistical analysis of binary content, they are able...

    Provided By University of Balamand

  • White Papers // Jun 2011

    Cybercrime: The Case of Obfuscated Malware

    Cybercrime has rapidly developed in recent years and mal-ware is one of the major security threats in computer which have been in existence from the very early days. There is a lack of understanding of such malware threats and what mechanisms can be used in implementing security prevention as well...

    Provided By University of Balamand

  • White Papers // Sep 2012

    Cloud Computing a Research Roadmap in Coalescence With Software Engineering

    The new concept of cloud computing with on-demand provisioning of a shared pool of configurable computing resources of unprecedented size, elastic scalability and ubiquitous network service accessibility has gained huge momentum in the IT industry. However, there are many issues faced in migrating existing systems into the cloud that have...

    Provided By University of Balamand

  • White Papers // Aug 2012

    SMEs and the Economic Growth: A Comparative Study of Clustering Techniques in SMEs Data Analysis

    Regional economic planning of Small-to-Medium Enterprises (SMEs) requires a thorough understanding of the industry structure and the size of business. The main body of the literature regarding SMEs is focused on formation and growth, as well as success and failure. Some studies have considered clustering regional areas based on functional...

    Provided By University of Balamand