Sciweavers

597 search results - page 69 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
KDD
2002
ACM
112views Data Mining» more  KDD 2002»
14 years 8 months ago
From run-time behavior to usage scenarios: an interaction-pattern mining approach
A key challenge facing IT organizations today is their evolution towards adopting e-business practices that gives rise to the need for reengineering their underlying software syst...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
ICSE
2008
IEEE-ACM
14 years 7 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...
DATE
2007
IEEE
126views Hardware» more  DATE 2007»
14 years 2 months ago
The ARTEMIS cross-domain architecture for embedded systems
platform and a suite of abstract components with which new developments in different application domains can be engineered with minimal effort [1]p.16. Generic platforms, or refere...
Hermann Kopetz
EWSPT
2003
Springer
14 years 26 days ago
Quality Ensuring Development of Software Processes
: Software development is a complex process where many organizational units, persons, systems and artifacts are involved. In companies that exceed a certain size the business proce...
Alexander Förster, Gregor Engels
EUROSPI
2005
Springer
14 years 1 months ago
Safety Methods in Software Process Improvement
Even if the application developers produce software in accordance with the customer requirements, they cannot guarantee that the software will behave in a safe way during the lifet...
Torgrim Lauritsen, Tor Stålhane