Sciweavers

341 search results - page 32 / 69
» A Security Engineering Process based on Patterns
Sort
View
ENTCS
2007
98views more  ENTCS 2007»
15 years 2 months ago
Frameworks Based on Templates for Rigorous Model-driven Development
The engineering of systems that are acceptably correct is a hard problem. On the one hand, semi-formal modelling approaches that are used in practical, large-scale system developm...
Nuno Amálio, Fiona Polack, Susan Stepney
124
Voted
AMAST
2008
Springer
15 years 4 months ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 6 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ICASSP
2011
IEEE
14 years 6 months ago
Artificial bandwidth extension of spectral envelope with temporal clustering
We present a new wideband spectral envelope estimation framework for the artificial bandwidth extension problem. The proposed framework builds temporal clusters of the joint sub-...
Can Yagli, Engin Erzin
219
Voted
SIGMOD
2009
ACM
202views Database» more  SIGMOD 2009»
16 years 2 months ago
ZStream: a cost-based query processor for adaptively detecting composite events
Composite (or Complex) event processing (CEP) systems search sequences of incoming events for occurrences of userspecified event patterns. Recently, they have gained more attentio...
Yuan Mei, Samuel Madden