-
2
-
-
84972531298
-
Correlations genuine and spurious in pearson and yule
-
Aldrich, J.: Correlations genuine and spurious in pearson and yule. Statistical Science 10(4), 364-376 (1995)
-
(1995)
Statistical Science
, vol.10
, Issue.4
, pp. 364-376
-
-
Aldrich, J.1
-
3
-
-
49049119382
-
Anti-Hook Shield against the Software Key Loggers
-
Aslam, M., Idrees, R., Baig, M., Arshad, M.: Anti-Hook Shield against the Software Key Loggers. In: Proceedings of the 2004 National Conference on Emerging Technologies, p. 189 (2004)
-
(2004)
Proceedings of the 2004 National Conference on Emerging Technologies
, pp. 189
-
-
Aslam, M.1
Idrees, R.2
Baig, M.3
Arshad, M.4
-
4
-
-
78249266480
-
-
BAPCO: SYSmark 2004 SE (2004), http://www.bapco.com/products/ sysmark2004se/
-
(2004)
SYSmark 2004 SE
-
-
-
5
-
-
62649168462
-
On the importance of the pearson correlation coefficient in noise reduction
-
Benesty, J., Chen, J., Huang, Y.: On the importance of the pearson correlation coefficient in noise reduction. IEEE Transactions on Audio, Speech, and Language Processing 16(4), 757-765 (2008)
-
(2008)
IEEE Transactions on Audio, Speech, and Language Processing
, vol.16
, Issue.4
, pp. 757-765
-
-
Benesty, J.1
Chen, J.2
Huang, Y.3
-
6
-
-
33751068975
-
Siren: Catching evasive malware (short paper)
-
Borders, K., Zhao, X., Prakash, A.: Siren: Catching evasive malware (short paper). In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 76-85 (2006)
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 76-85
-
-
Borders, K.1
Zhao, X.2
Prakash, A.3
-
7
-
-
84882738195
-
Automatically identifying trigger-based behavior in malware
-
Brumley, D., Hartwig, C., Liang, Z., Newsome, J., Song, D., Yin, H.: Automatically identifying trigger-based behavior in malware. Advances in Information Security 36, 65-88 (2008)
-
(2008)
Advances in Information Security
, vol.36
, pp. 65-88
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
8
-
-
33748856157
-
Understanding correlation: Factors that affect the size of r
-
Goodwin, L., Leech, N.: Understanding correlation: Factors that affect the size of r. The Journal of Experimental Education 74(3), 249-266 (2006) (Pubitemid 44757330)
-
(2006)
Journal of Experimental Education
, vol.74
, Issue.3
, pp. 251-266
-
-
Goodwin, L.D.1
Leech, N.L.2
-
10
-
-
48249085284
-
Honeyid: Unveiling hidden spywares by generating bogus events
-
Han, J., Kwon, J., Lee, H.: Honeyid: Unveiling hidden spywares by generating bogus events. In: Proceedings of The Ifip Tc 11 23rd International Information Security Conference, pp. 669-673 (2008)
-
(2008)
Proceedings of the Ifip Tc 11 23rd International Information Security Conference
, pp. 669-673
-
-
Han, J.1
Kwon, J.2
Lee, H.3
-
11
-
-
0043199887
-
Characteristics of I/O traffic in personal computer and server workloads
-
Hsu, W., Smith, A.: Characteristics of I/O traffic in personal computer and server workloads. IBM System Journal 42(2), 347-372 (2003)
-
(2003)
IBM System Journal
, vol.42
, Issue.2
, pp. 347-372
-
-
Hsu, W.1
Smith, A.2
-
12
-
-
85077680022
-
Behavior-based spyware detection
-
Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior-based spyware detection. In: Proceedings of the 15th USENIX Security Symposium (USENIX Security 2006) (2006)
-
Proceedings of the 15th USENIX Security Symposium (USENIX Security 2006) (2006)
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.5
-
13
-
-
1442313185
-
An effective approach for solving the binary assignment problem with side constraints
-
Kochenberger, G., Glover, F., Alidaee, B.: An effective approach for solving the binary assignment problem with side constraints. Internation Journal of Information Technology and Decision Making 1, 121-129 (2002)
-
(2002)
Internation Journal of Information Technology and Decision Making
, vol.1
, pp. 121-129
-
-
Kochenberger, G.1
Glover, F.2
Alidaee, B.3
-
14
-
-
0002719797
-
The hungarian method for the assignment problem
-
Kuhn, H.W.: The hungarian method for the assignment problem. Naval Research Logistics Quarterly 2, 83-97 (1955)
-
(1955)
Naval Research Logistics Quarterly
, vol.2
, pp. 83-97
-
-
Kuhn, H.W.1
-
16
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
May
-
Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: Proceeding of the 28th IEEE Symposium on Security and Privacy (SP 2007), pp. 231-245 (May 2007)
-
(2007)
Proceeding of the 28th IEEE Symposium on Security and Privacy (SP 2007)
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
17
-
-
78249237744
-
Kinkois spyware case highlights risk of public internet terminals
-
San Jose Mercury News: Kinkois spyware case highlights risk of public internet terminals (2009), http://www.siliconvalley.com/mld/siliconvalley/news/ 6359407.htm
-
(2009)
San Jose Mercury News
-
-
-
18
-
-
84952503562
-
Thirteen ways to look at the correlation coefficient
-
Rodgers, J.L., Nicewander, W.A.: Thirteen ways to look at the correlation coefficient. The American Statistician 42(1), 59-66 (1988)
-
(1988)
The American Statistician
, vol.42
, Issue.1
, pp. 59-66
-
-
Rodgers, J.L.1
Nicewander, W.A.2
|