Sciweavers

224 search results - page 22 / 45
» Composable Tools For Network Discovery and Security Analysis
Sort
View
ISM
2006
IEEE
112views Multimedia» more  ISM 2006»
14 years 1 months ago
Security Considerations for SOA-Based Multimedia Applications
Growing levels of digitalization and broadband access drives extremely fast progress in multimedia and networking technologies and allows consumers to create requirements at an ac...
Andrew Roczniak, Alexandre Miège, Abdulmota...
DSN
2003
IEEE
14 years 27 days ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
ACSAC
2007
IEEE
14 years 1 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
IPPS
2007
IEEE
14 years 1 months ago
RASC: Dynamic Rate Allocation for Distributed Stream Processing Applications
In today’s world, stream processing systems have become important, as applications like media broadcasting, sensor network monitoring and on-line data analysis increasingly rely...
Yannis Drougas, Vana Kalogeraki
BMCBI
2008
122views more  BMCBI 2008»
13 years 7 months ago
Reconstructing networks of pathways via significance analysis of their intersections
Background: Significance analysis at single gene level may suffer from the limited number of samples and experimental noise that can severely limit the power of the chosen statist...
Mirko Francesconi, Daniel Remondini, Nicola Nerett...