Sciweavers

151 search results - page 22 / 31
» Considering Operational Security Risk during System Developm...
Sort
View
NDSS
2007
IEEE
14 years 3 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
SOUPS
2009
ACM
14 years 3 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
CADE
1998
Springer
14 years 1 months ago
System Description: card TAP: The First Theorem Prover on a Smart Card
Abstract. We present the first implementation of a theorem prover running on a smart card. The prover is written in Java and implements a dual tableau calculus. Due to the limited ...
Rajeev Goré, Joachim Posegga, Andrew Slater...
TITS
2008
101views more  TITS 2008»
13 years 9 months ago
Lane-Change Fuzzy Control in Autonomous Vehicles for the Overtaking Maneuver
Abstract--The automation of the overtaking maneuver is considered to be one of the toughest challenges in the development of autonomous vehicles. This operation involves two vehicl...
José Eugenio Naranjo, Carlos Gonzále...
MEMICS
2010
13 years 3 months ago
Monitoring and Control of Temperature in Networks-on-Chip
Abstract. Increasing integration densities and the emergence of nanotechnology cause issues related to reliability and power consumption to become dominant factors for the design o...
Tim Wegner, Claas Cornelius, Andreas Tockhorn, Dir...