Sciweavers

475 search results - page 58 / 95
» An Approach to the Description and Analysis of Hybrid System...
Sort
View
RAID
2007
Springer
14 years 2 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
MSR
2006
ACM
14 years 1 months ago
Fine grained indexing of software repositories to support impact analysis
Versioned and bug-tracked software systems provide a huge amount of historical data regarding source code changes and issues management. In this paper we deal with impact analysis...
Gerardo Canfora, Luigi Cerulo
ASE
2006
148views more  ASE 2006»
13 years 8 months ago
PLFaultCAT: A Product-Line Software Fault Tree Analysis Tool
Industry currently employs a product line approach to software development and deployment as a means to enhance quality while reducing development cost and time. This effort has cr...
Josh Dehlinger, Robyn R. Lutz
ICSE
2005
IEEE-ACM
14 years 8 months ago
Monitoring and control in scenario-based requirements analysis
Scenarios are an effective means for eliciting, validating and documenting requirements. At the requirements level, scenarios describe sequences of interactions between the softwa...
Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebasti&...
IJSN
2006
124views more  IJSN 2006»
13 years 8 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy