نتایج جستجو برای: antivirus update agent system
تعداد نتایج: 2473140 فیلتر نتایج به سال:
Update rules and interevent time distributions: slow ordering versus no ordering in the voter model.
We introduce a general methodology of update rules accounting for arbitrary interevent time (IET) distributions in simulations of interacting agents. We consider in particular update rules that depend on the state of the agent, so that the update becomes part of the dynamical model. As an illustration we consider the voter model in fully connected, random, and scale-free networks with an activa...
The paper gives an overview of a multi-agent real-time scheduling solution for taxi companies. It covers problem definition, describes a multi-agent approach to real-time scheduling, outlines the system architecture and gives performance matrices. Key design decisions are also discussed. The most important achievements are the ability of the system to re-schedule taxi service before confirming ...
In recent years, researchers have relied heavily on labels provided by antivirus companies in establishing ground truth for applications and algorithms of malware detection, classification, and clustering. Furthermore, companies use those labels for guiding their mitigation and disinfection efforts. However, ironically, there is no prior systematic work that validates the performance of antivir...
This study investigates Greek accounting offices use of Information and Communication Technologies (ICT). Initially, a comprehensive questionnaire was developed. It contains 35 questions with multiple answers and 2 open questions tailored to the accountants. One hundred accountants’ offices in a Greek county answered the questionnaire. The findings present their current ICT infrastructure and t...
Antivirus scanners are designed to detect malware and, to a lesser extent, to label detections based on a family association. The labeling provided by AV vendors has many applications such as guiding efforts of disinfection and countermeasures, intelligence gathering, and attack attribution, among others. Furthermore, researchers rely on AV labels to establish a baseline of ground truth to comp...
چکیده ندارد.
We propose a technique for defeating signature-based malware detectors by exploiting information disclosed by antivirus interfaces. This information is leveraged to reverse engineer relevant details of the detector’s underlying signature database, revealing binary obfuscations that suffice to conceal malware from the detector. Experiments with real malware and antivirus interfaces on Windows op...
Two experiments executed in three phases: Exploration: we initialize an empty policy and let the system learn in real time Exploitation: the agent simply uses the previously-learned policy to automatically resolve bottlenecks Baseline: scale up every replicable tier every time a bottleneck occurs The workload pattern modeling method learns a clustering model: Update Q-value for each act...
A Mobile Node (MN) has to intimate to the Home Agent (HA) about its location to Correspondent Node (CN), using a Binding Update (BU) between HA and MN. During this exchange; an intruder may enter easily because of security lapses. Hence, a security mechanism is required to protect the BU. A new security system using hybrid cryptosystem is proposed for Binding Update (BU) in MIPv6.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید