Sciweavers

2358 search results - page 200 / 472
» A Secure Pervasive Environment
Sort
View
SAFECOMP
2010
Springer
13 years 7 months ago
Assurance of Automotive Safety - A Safety Case Approach
A safety case should provide a clear, comprehensible and defensible argument, supported by evidence, that a system is acceptably safe to operate in a particular environment. This a...
Robert Palin, Ibrahim Habli
IWPC
2006
IEEE
14 years 3 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
JNW
2008
83views more  JNW 2008»
13 years 9 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
TRUSTBUS
2009
Springer
14 years 3 months ago
Advanced Features in Bayesian Reputation Systems
Abstract. Bayesian reputation systems are quite flexible and can relatively easily be adapted to different types of applications and environments. The purpose of this paper is to ...
Audun Jøsang, Walter Quattrociocchi
IEEEARES
2007
IEEE
14 years 3 months ago
Attacks are Protocols Too
In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe i...
Anders Moen Hagalisletto