Sciweavers

335 search results - page 14 / 67
» An Architecture-Centric Approach to Detecting Security Patte...
Sort
View
SAC
2008
ACM
13 years 8 months ago
Design pattern detection by template matching
In this paper, we adopt a template matching method to detect design patterns from a software system by calculating their normalized cross correlation. Because design patterns docu...
Jing Dong, Yongtao Sun, Yajing Zhao
ANCS
2007
ACM
14 years 18 days ago
Optimization of pattern matching algorithm for memory based architecture
Due to the advantages of easy re-configurability and scalability, the memory-based string matching architecture is widely adopted by network intrusion detection systems (NIDS). In...
Cheng-Hung Lin, Yu-Tang Tai, Shih-Chieh Chang
JSW
2008
98views more  JSW 2008»
13 years 8 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
IEEEARES
2010
IEEE
14 years 1 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
IWPC
2008
IEEE
14 years 3 months ago
Identifying Architectural Change Patterns in Object-Oriented Systems
As an object-oriented system evolves, its architecture tends to drift away from the original design. Knowledge of how the system has changed at coarse-grained levels is key to und...
Xinyi Dong, Michael W. Godfrey