Skip to main content
This paper discusses a detection mechanism for malicious code through statistical analysis of opcode distributions. A total of 67 malware executables were sampled statically disassembled and their statistical opcode frequency distribution... more
    • by 
    •   4  
      Statistical AnalysisDigital ForensicsFrequencyExecutables
This paper develops a prototyping technique for information systems security policies. Starting from the algebraic specification of a security policy, we derive an executable specification that represents a prototype of the actual policy.... more
    • by 
    •   29  
      Quantum ComputingArtificial IntelligencePhilosophy of MindLogic
This paper develops a prototyping technique for information systems security policies. Starting from the algebraic specification of a security policy, we derive an executable specification that represents a prototype of the actual policy.... more
    • by  and +1
    •   29  
      Distributed ComputingQuantum ComputingArtificial IntelligencePhilosophy of Mind