Sciweavers

2342 search results - page 326 / 469
» A Methodology for Evaluating Software Engineering Methods an...
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ICSE
2007
IEEE-ACM
14 years 9 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
CISIS
2010
IEEE
14 years 29 days ago
A Pattern-Based Coordination and Test Framework for Multi-Agent Simulation of Production Automation Systems
— Production automation systems consist of many entities (like robots and shuttles) that interact in complex ways to provide the overall system functionality like product assembl...
Thomas Moser, Munir Merdan, Stefan Biffl
ISSTA
2012
ACM
11 years 11 months ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...
USS
2008
13 years 11 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian