Sciweavers

335 search results - page 35 / 67
» An Architecture-Centric Approach to Detecting Security Patte...
Sort
View
ICSE
2000
IEEE-ACM
13 years 11 months ago
Quickly detecting relevant program invariants
Explicitly stated program invariants can help programmers by characterizing certain aspects of program execution and identifying program properties that must be preserved when mod...
Michael D. Ernst, Adam Czeisler, William G. Griswo...
WWW
2008
ACM
14 years 8 months ago
Detecting image spam using visual features and near duplicate detection
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...
Bhaskar Mehta, Saurabh Nangia, Manish Gupta 0002, ...
VIZSEC
2004
Springer
14 years 27 days ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
IPPS
2007
IEEE
14 years 1 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel
CBSE
2008
Springer
13 years 9 months ago
A Practical Approach for Finding Stale References in a Dynamic Service Platform
The OSGiTM Service Platform is becoming the de facto standard for modularized Java applications. The market of OSGi based COTS components is continuously growing. OSGi specific pro...
Kiev Gama, Didier Donsez