Sciweavers

597 search results - page 70 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
ITNG
2008
IEEE
14 years 2 months ago
Prototype Generation from Ontology Charts
Semantic Analysis is a business analysis method designed to capture user requirements and represent them as text or in a graph that is called Ontology Chart. Ontology Charts can b...
George Tsaramirsis, Iman Poernomo
DISCEX
2003
IEEE
14 years 28 days ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong
ISSRE
2002
IEEE
14 years 17 days ago
A Flexible Generator Architecture for Improving Software Dependability
Improving the dependability of computer systems is increasingly important as more and more of our lives depend on the availability of such systems. Wrapping dynamic link libraries...
Christof Fetzer, Zhen Xiao
NCA
2008
IEEE
14 years 2 months ago
Quicksilver Scalable Multicast (QSM)
QSM is a multicast engine designed to support a style of distributed programming in which application objects are replicated among clients and updated via multicast. The model req...
Krzysztof Ostrowski, Ken Birman, Danny Dolev
ICSE
2005
IEEE-ACM
14 years 7 months ago
Use of relative code churn measures to predict system defect density
Software systems evolve over time due to changes in requirements, optimization of code, fixes for security and reliability bugs etc. Code churn, which measures the changes made to...
Nachiappan Nagappan, Thomas Ball