Filters








8 Hits in 3.9 sec

Babble: Identifying malware by its dialects

Aziz Mohaisen, Omar Alrawi, Andrew G. West, Allison Mankin
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
SUMMARY Using runtime execution artifacts to identify whether code is malware, and to which malware family it belongs, is an established technique in the security domain.  ...  BABBLE: THE TECHNIQUE We begin by summarizing the Babble workflow, as visualized in Fig. 1 .  ... 
doi:10.1109/cns.2013.6682751 dblp:conf/cns/MohaisenAWM13 fatcat:oqw5ajgvz5dn7dog3n7b3ghu5q

Sender Recognition of E-mail & Email Categorization

George Philip C, Bansi R. Savaliya
2017 IJARCCE  
This paper involves development of a feasible solution to this problem by identifying the real sender using past email patterns and features.  ...  Another aspect of the problem is that due to very high number of incoming emails, it is very difficult to identify the required ones easily.  ...  For instance, a word with a punctuation "okuldan" (from school) is assumed as "okul" (school) as indicated by end of babble word in this review.  ... 
doi:10.17148/ijarcce.2017.6621 fatcat:rvpbyylm2nfibfppk7pnj5pfjq

Preservation of spatial information

Göran Samuelsson
2017 Integrating ICT in Society   unpublished
Funding This work has been supported in part by the Croatian Science Foundation under the project IP-06-2016.  ...  Acknowledgement This paper was made possible by NPRP grant 9-175-1-033 from the Qatar National Research Fund (a member of Qatar Foundation).  ...  Once a dialect is identified, it will be mapped to standard Arabic for further processing using the MSA tools as there is a lack of dialect dedicated NLP tools.  ... 
doi:10.17234/infuture.2017.11 fatcat:l62ckcezzncjjdpz7toae7u3ha

Disrupting surveillance: critical software design-led practice to obfuscate and reveal surveillance economies and knowledge monopolies [article]

Hadi Mehrpouya, Craig Martin, Chris Speed, University Of Edinburgh
2021
technology in its current form.  ...  By mobilising critical design methods, I made a series of critical design works to reveal and disrupt surveillance and knowledge monopolies.  ...  One of the common spy and hacking techniques are malware/weaponised surveillance malware.  ... 
doi:10.7488/era/1188 fatcat:dqzfuxychfafdabx4yhz3c5ioe

Inferring social behavior and interaction on twitter by combining metadata about users & messages

Marc Cheong
2017
Real-life happenings are constantly reported on Twitter; thus, it functions as a 'mirror' to the real world.  ...  A good example is Twitter, which is a rich source of readily-available information by, and about, people.  ...  messages (retweets) Tweets by time of day Morning: retweets Midday: news and babble (spam/promotions peaking twice) End of work day: conversations Tweets by weekday Early week: retweets Mid-week  ... 
doi:10.4225/03/58b5009d3726a fatcat:x7xi2espbbd73jlg4s45hifclu

Linguistic and Cultural Diversity in Cyberspace

Evgeny Kuzmin, Adama Samassekou, Daniel Prado, Evgenia Mikhailova, Sergey Bakeykin, Anastasia Parshakova, Tatiana Murovana, Nadezhda Zaikova, Liudmila Zaikova
2011 The book includes communications by the participants of the 2 nd International Conference Linguistic and Cultural Diversity in Cyberspace   unpublished
In addition to a wide coverage of languages, it can identify various types of legacy encodings 2 , which are still extensively used by many non-Latin-script user communities.  ...  It is often said that there are 1650 dialects spoken by different communities across the country. The government of India has recognized 22 languages as constitutionally approved languages.  ...  Eskimo baydara-anyapik, a small boat employed in ice hunting for sealife; it has a wooden skeleton secured by leather straps, and is upholstered with walrus skin.  ... 
fatcat:ii2g7o6yhvgefcwpxhaohjnfvm

Lexical innovation on the internet - neologisms in blogs

Dorota Smyk-Bhattacharjee
2009
Indiana combines a HTML-to-text converter, a cumulative database, and a series of filters, to identify potential neologisms in my corpus.  ...  It fuses the corpus-based approach with lexicographic analysis.  ...  " by the American Dialect Society at the annual Words of the Year (WOTY) though it may exist for another person.  ... 
doi:10.5167/uzh-163845 fatcat:z3bfu2hqxba3tjbi5kt4pgjsam

Recommended Citation Sohval, Daniel

Daniel Sohval
2013 unpublished
By which I mean, I am unable to identify any of the songs by their titles.  ...  They coo and babble along with it, sliding knees they would never see behind their bulbous diapered rears.  ...  She too fell to her knees, stymied by recursive mind reading. She could sim his empathy, and she knew he knew she could sim it. And Halisdol too could sim her simming.  ... 
fatcat:hqctrgrexfga7gbde277mlw6fy