Sciweavers

335 search results - page 18 / 67
» An Architecture-Centric Approach to Detecting Security Patte...
Sort
View
DAC
2007
ACM
14 years 9 months ago
Hardware Support for Secure Processing in Embedded Systems
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
Shufu Mao, Tilman Wolf
BMCBI
2005
106views more  BMCBI 2005»
13 years 8 months ago
A multistep bioinformatic approach detects putative regulatory elements in gene promoters
Background: Searching for approximate patterns in large promoter sequences frequently produces an exceedingly high numbers of results. Our aim was to exploit biological knowledge ...
Stefania Bortoluzzi, Alessandro Coppe, Andrea Biso...
IEEEARES
2007
IEEE
14 years 2 months ago
AProSec: an Aspect for Programming Secure Web Applications
Adding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should tak...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...
ICAI
2008
13 years 10 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
IADIS
2003
13 years 10 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire