Heuristic analysis

Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1982-2017
05101519822017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Android’s security framework has been an appealing subject of research in the last few years. Android has been shown to be… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
It is very important that designers recognize the benefits and limitations of different usability inspection methods. This is… (More)
  • table 1
  • table 3
  • table 2
  • figure 1
  • table 4
Is this relevant?
2009
2009
  • David Harley BA CISSP, FBCS CITP, Andrew Lee CISSP
  • 2009
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners… (More)
Is this relevant?
2007
2007
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners… (More)
Is this relevant?
2007
2007
New programming approach standards including develop tools and environment are introduced when people plan to design a non… (More)
  • figure 1
Is this relevant?
2005
2005
Alexa [1] and Ivrissimtzis et al [13] have proposed a classification mechanism for bivariate subdivision schemes. Alexa considers… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2000
2000
Fault trees are widely used for safety analysis. In this context fault trees are considered as boolean formulas. The major… (More)
  • figure 1
  • figure 2
  • table 2
Is this relevant?
1998
1998
Constructing a small BDD from a given boolean formula depends on finding a good variable ordering. Finding a good order is NP… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
1996
1996
Many advantages have been given for using formal speciications in the design and implementation of communication systems… (More)
Is this relevant?
Highly Cited
1991
Highly Cited
1991
In this paper we explore the bias in TCP/IP networks against connections with multiple congested gateways. We consider the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?