Sciweavers

2342 search results - page 326 / 469
» A Methodology for Evaluating Software Engineering Methods an...
Sort
View
120
Voted
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 10 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ICSE
2007
IEEE-ACM
16 years 3 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
146
Voted
CISIS
2010
IEEE
15 years 7 months ago
A Pattern-Based Coordination and Test Framework for Multi-Agent Simulation of Production Automation Systems
— Production automation systems consist of many entities (like robots and shuttles) that interact in complex ways to provide the overall system functionality like product assembl...
Thomas Moser, Munir Merdan, Stefan Biffl
138
Voted
ISSTA
2012
ACM
13 years 6 months ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...
USS
2008
15 years 5 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian