Sciweavers

419 search results - page 21 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
KBSE
2006
IEEE
14 years 2 months ago
Automated Reasoning on Aspects Interactions
The aspect-oriented paradigm allows weaving aspects in different join points of a program. Aspects can modify object fields and method control flow, thus possibly introducing subt...
Paolo Falcarin, Marco Torchiano
TSMC
2010
13 years 3 months ago
Automated Modeling of Dynamic Reliability Block Diagrams Using Colored Petri Nets
Computer system reliability is conventionally modeled and analyzed using techniques such as fault tree analysis (FTA) and reliability block diagrams (RBD), which provide static rep...
Ryan Robidoux, Haiping Xu, Liudong Xing, MengChu Z...
SAC
2010
ACM
14 years 3 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
ICC
2007
IEEE
14 years 3 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
KBSE
2007
IEEE
14 years 3 months ago
A framework and tool supports for testing modularity of software design
Modularity is one of the most important properties of a software design, with significant impact on changeability and evolvability. However, a formalized and automated approach i...
Yuanfang Cai, Sunny Huynh, Tao Xie