[LIBRO][B] An introduction to Kolmogorov complexity and its applications

M Li, P Vitányi - 2008 - Springer
Ming Li Paul Vitányi Fourth Edition Page 1 An Introduction to Kolmogorov Complexity and Its
Applications Ming Li Paul Vitányi Fourth Edition Texts in Computer Science Page 2 Texts in …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …

Systems, apparatus, and methods for detecting malware

C Alme - US Patent 8,312,546, 2012 - Google Patents
Various embodiments, including a method comprising creat ing a first fuZZy fingerprint of a
known malware file, the first fuZZy fingerprint including a first set of calculated complexity …

Systems, methods, and media for generating bait information for trap-based defenses

AD Keromytis, SJ Stolfo - US Patent 8,819,825, 2014 - Google Patents
Systems, methods, and media for generating bait information for trap-based defenses are
provided. In some embodiments, methods for generating bait information for trap-based …

Intrusion detection using MDL compression

EE Eiland, SC Evans, TS Markham… - US Patent 8,375,446, 2013 - Google Patents
This application is a continuation of US patent applica tion Ser. No. 12/260,627, filed Oct. 29,
2008, the entire dis closure of which is hereby incorporated by reference. Embodiments of …

[HTML][HTML] Analogical proportions: from equality to inequality

H Prade, G Richard - International Journal of Approximate Reasoning, 2018 - Elsevier
Analogical proportions are statements of the form a is to b as c is to d. Such expressions
compare the pair (a, b) with the pair (c, d). Previous papers have developed logical …

Method of polymorphic detection

LA Flynn, GR Thompson - US Patent 8,046,834, 2011 - Google Patents
A computer program signature may be determined based on the function flow grammar for a
given source code. The function flow grammar may be determined based on reduced control …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2016 - Google Patents
Methods, systems, and media for providing trap-based defenses are provided. In
accordance with some embodiments, a method for providing trap-based defenses is …

Image characterization and classification by physical complexity

H Zenil, JP Delahaye, C Gaucherel - Complexity, 2012 - Wiley Online Library
We present a method for estimating the complexity of an image based on Bennett's concept
of logical depth. Bennett identified logical depth as the appropriate measure of organized …