Sciweavers

40 search results - page 5 / 8
» A qualitative analysis of software security patterns
Sort
View
RAID
2010
Springer
13 years 7 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
OOPSLA
2004
Springer
14 years 1 months ago
Finding bugs is easy
Many techniques have been developed over the years to automatically find bugs in software. Often, these techniques rely on formal methods and sophisticated program analysis. Whil...
David Hovemeyer, William Pugh
CISIS
2010
IEEE
14 years 1 months ago
Shared Data Grid Programming Improvements Using Specialized Objects
- The shared data programming model is an attractive grid programming alternative to message passing solutions. This paper addresses type related improvements to a shared data grid...
Dacian Tudor, Georgiana Macariu, Wolfgang Schreine...
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 7 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
14 years 26 days ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...