Sciweavers

29 search results - page 2 / 6
» Conformance checking of processes based on monitoring real b...
Sort
View
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 1 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
22
Voted
DEBU
2008
104views more  DEBU 2008»
13 years 7 months ago
Process Mining in Web Services: The WebSphere Case
Process mining has emerged as a way to discover or check the conformance of processes based on event logs. This enables organizations to learn from processes as they really take p...
Wil M. P. van der Aalst, H. M. W. (Eric) Verbeek
APSEC
2008
IEEE
14 years 1 months ago
Behavioral Specification of Real-Time Requirements
This paper aims to present a systematic method to: (1) specify high-level and event based real-time requirements and (2) map the specified requirements to low-level and state-base...
Seyed Morteza Babamir, Faezeh Sadat Babamir
SIGCOMM
2006
ACM
14 years 1 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
DSN
2005
IEEE
14 years 1 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...