Sciweavers

419 search results - page 32 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
OSDI
2004
ACM
14 years 9 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
ESSOS
2009
Springer
14 years 1 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
ICSE
2009
IEEE-ACM
13 years 6 months ago
Reflecting on self-adaptive software systems
Self-adaptability has been proposed as an effective approach to automate the complexity associated with the management of modern-day software systems. While over the past decade w...
Jesper Andersson, Rogério de Lemos, Sam Mal...
JIT
2004
Springer
131views Database» more  JIT 2004»
14 years 2 months ago
Testing of Service-Oriented Architectures - A Practical Approach
Service Oriented Architectures (SOAs) have recently emerged as a new promising paradigm for supporting distributed computing. Web services, as well as integration-packages relying ...
Schahram Dustdar, Stephan Haslinger
LCTRTS
2007
Springer
14 years 2 months ago
Combining source-to-source transformations and processor instruction set extensions for the automated design-space exploration o
Industry’s demand for flexible embedded solutions providing high performance and short time-to-market has led to the development of configurable and extensible processors. The...
Richard Vincent Bennett, Alastair Colin Murray, Bj...