Sciweavers

1075 search results - page 77 / 215
» Calculating the Number of Tunnels
Sort
View
ICSE
2007
IEEE-ACM
14 years 10 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
TACAS
2010
Springer
137views Algorithms» more  TACAS 2010»
14 years 5 months ago
Statistical Measurement of Information Leakage
Information theory provides a range of useful methods to analyse probability distributions and these techniques have been successfully applied to measure information flow and the ...
Konstantinos Chatzikokolakis, Tom Chothia, Apratim...
HICSS
2010
IEEE
203views Biometrics» more  HICSS 2010»
14 years 5 months ago
Secure Planning of Order Picking Systems with the Aid of Simulation
Planning a new logistics center is a quite difficult job. Depending on the requirements there are a great number of possible design versions. The planner has to consider not only ...
Alexander Ulbrich, Stefan Galka, Willibald A. G&uu...
AINA
2009
IEEE
14 years 4 months ago
Massively Scalable Web Service Discovery
The increasing popularity of Web Services (WS) has exemplified the need for scalable and robust discovery mechanisms. Although decentralized solutions for discovering WS promise ...
George Anadiotis, Spyros Kotoulas, Holger Lausen, ...
TASE
2009
IEEE
14 years 4 months ago
Interpreting a Successful Testing Process: Risk and Actual Coverage
Testing is inherently incomplete; no test suite will ever be able to test all possible usage scenarios of a system. It is therefore vital to assess the implication of a system pas...
Mariëlle Stoelinga, Mark Timmer