Sciweavers

329 search results - page 37 / 66
» A Theory of Secure Control Flow
Sort
View
306
Voted

Lecture Notes
773views
17 years 1 months ago
Computer Networking and Internet Protocols: A Comprehensive Introduction
The lecture notes cover the following topics, Fundamentals (OSI Reference Model, Coding, Ethernet), Data Link Control (Flow Control, Error Control, HDLC, PPP), Internet Protocol ...
Raj Jain
123
Voted
ACSAC
2009
IEEE
15 years 7 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
127
Voted
ESOP
2000
Springer
15 years 7 months ago
Polyvariant Flow Analysis with Constrained Types
Abstract. The basic idea behind improving the quality of a monovariant control flow analysis such as 0CFA is the concept of polyvariant analyses such as Agesen's Cartesian Pro...
Scott F. Smith, Tiejun Wang
CONCURRENCY
2006
111views more  CONCURRENCY 2006»
15 years 3 months ago
ScyFlow: an environment for the visual specification and execution of scientific workflows
With the advent of grid technologies, scientists and engineers are building more and more complex applications to utilize distributed grid resources. The core grid services provid...
Karen M. McCann, Maurice Yarrow, Adrian De Vivo, P...
195
Voted
DSN
2011
IEEE
14 years 3 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...