Sciweavers

419 search results - page 22 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
CIKM
2008
Springer
13 years 10 months ago
A consensus based approach to constrained clustering of software requirements
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher
IWSAS
2001
Springer
14 years 1 months ago
Model-Based Diagnosis for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attack. Successful attacks on these systems can lead to catastrophic results; the sur...
Howard E. Shrobe
NSPW
2006
ACM
14 years 2 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
FASE
2011
Springer
13 years 9 days ago
Automated Learning of Probabilistic Assumptions for Compositional Reasoning
Probabilistic verification techniques have been applied to the formal modelling and analysis of a wide range of systems, from communication protocols such as Bluetooth, to nanosca...
Lu Feng, Marta Z. Kwiatkowska, David Parker
GI
2007
Springer
14 years 3 months ago
Test Automation Meets Static Analysis
: In this article we advocate an integrated approach for the automation of module or software integration testing and static analysis. It is illustrated how funmethods of static an...
Jan Peleska, Helge Löding, Tatiana Kotas