Sciweavers

434 search results - page 78 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
LCR
1998
Springer
119views System Software» more  LCR 1998»
13 years 11 months ago
QoS Aspect Languages and Their Runtime Integration
Abstract. Distributedobject middleware, suchas CORBA, hides systemand network-speci c characteristics of objects behind functional interface speci cations. This simpli es developme...
Joseph P. Loyall, David E. Bakken, Richard E. Scha...
ACSAC
2007
IEEE
14 years 1 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
REFLECTION
2001
Springer
14 years 1 days ago
Performance and Integrity in the OpenORB Reflective Middleware
, are to address what we perceive as the most pressing shortcomings of current reflective middleware platforms. First, performance: in the worst case, this needs to be on a par wit...
Gordon S. Blair, Geoff Coulson, Michael Clarke, Ni...
INFOCOM
2007
IEEE
14 years 1 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin
ATAL
2010
Springer
13 years 8 months ago
Path disruption games
We propose Path Disruption Games (PDGs), which consider collaboration between agents attempting stop an adversary from travelling from a source node to a target node in a graph. P...
Yoram Bachrach, Ely Porat