Sciweavers

443 search results - page 54 / 89
» Compensation-Aware Runtime Monitoring
Sort
View
WORM
2003
14 years 9 days ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
IEEESCC
2009
IEEE
14 years 5 months ago
Analyzing Impact Factors on Composite Services
Although Web services are intended for short term, ad hoc collaborations, in practice many Web service compositions are offered longterm to customers. While the Web services makin...
Lianne Bodenstaff, Andreas Wombacher, Manfred Reic...
WOLLIC
2009
Springer
14 years 5 months ago
: An Action-Based Logic for Reasoning about Contracts
Abstract. This paper presents a new version of the CL contract specification language. CL combines deontic logic with propositional dynamic logic but it applies the modalities exc...
Cristian Prisacariu, Gerardo Schneider
ETS
2007
IEEE
105views Hardware» more  ETS 2007»
14 years 5 months ago
Communication-Centric SoC Debug Using Transactions
— The growth in System-on-Chip complexity puts pressure on system verification. Due to limitations in the pre-silicon verification process, errors in hardware and software slip...
Bart Vermeulen, Kees Goossens, Remco van Steeden, ...
IAT
2007
IEEE
14 years 5 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...