Sciweavers

2269 search results - page 333 / 454
» Behavioral Intrusion Detection
Sort
View
CLEIEJ
2010
13 years 7 months ago
Quality Improvement in Annotated Code
In order to customize their behavior at runtime, a wide sort of modern frameworks do use code annotations at the applications classes as metadata configuration. However, despite i...
Diego A. A. Correia, Eduardo M. Guerra, Fáb...
APSEC
2010
IEEE
13 years 5 months ago
Testing Inter-layer and Inter-task Interactions in RTES Applications
Abstract--Real-time embedded systems (RTESs) are becoming increasingly ubiquitous, controlling a wide variety of popular and safety-critical devices. Effective testing techniques c...
Ahyoung Sung, Witawas Srisa-an, Gregg Rothermel, T...
INFOCOM
2008
IEEE
14 years 4 months ago
Attack-Tolerant Time-Synchronization in Wireless Sensor Networks
—Achieving secure time-synchronization in wireless sensor networks (WSNs) is a challenging, but very important problem that has not yet been addressed effectively. This paper pro...
Xin Hu, Taejoon Park, Kang G. Shin
INFOCOM
2007
IEEE
14 years 4 months ago
Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
— Protecting BGP routing from errors and malice is one of the next big challenges for Internet routing. Several approaches have been proposed that attempt to capture and block ro...
Georgos Siganos, Michalis Faloutsos
ACSAC
2006
IEEE
14 years 4 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...