Sciweavers

587 search results - page 85 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
IEEEIAS
2007
IEEE
14 years 3 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
IEAAIE
2009
Springer
14 years 3 months ago
RFID Technology and AI Techniques for People Location, Orientation and Guiding
One of the main problems that we have to face when visiting public or official buildings (i.e hospitals or public administrations) is the lack of information and signs that can gui...
M. D. R-Moreno, Bonifacio Castaño, Melquiad...
CCS
2007
ACM
14 years 3 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
13 years 4 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...
CAISE
2006
Springer
14 years 24 days ago
Modeling User Behaviour Aware WebSites with PRML
Adaptive websites usually change as effect of user navigational actions. Most current web engineering approaches (which consider personalization) allow to detect basic user browsin...
Irene Garrigós, Jaime Gómez