Sciweavers

338 search results - page 63 / 68
» A Formal Approach to Heuristically Test Restorable Systems
Sort
View
CRITIS
2007
13 years 10 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
CORR
2007
Springer
154views Education» more  CORR 2007»
13 years 8 months ago
Application of a design space exploration tool to enhance interleaver generation
This paper presents a methodology to efficiently explore the design space of communication adapters. In most digital signal processing (DSP) applications, the overall performance ...
Cyrille Chavet, Philippe Coussy, Pascal Urard, Eri...
SOCO
2008
Springer
13 years 8 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
COMPSEC
2010
122views more  COMPSEC 2010»
13 years 7 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
ICDCS
2003
IEEE
14 years 2 months ago
Protecting BGP Routes to Top Level DNS Servers
—The Domain Name System (DNS) is an essential part of the Internet infrastructure and provides fundamental services, such as translating host names into IP addresses for Internet...
Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Dan...