Sciweavers

2523 search results - page 366 / 505
» Correct Development of Embedded Systems
Sort
View
CSFW
2004
IEEE
14 years 29 days ago
From Stack Inspection to Access Control: A Security Analysis for Libraries
We present a new static analysis for reviewing the security of libraries for systems, such as JVMs or the CLR, that rely on stack inspection for access control. We describe its im...
Frédéric Besson, Tomasz Blanc, C&eac...
DASC
2006
IEEE
14 years 27 days ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
FPGA
2006
ACM
156views FPGA» more  FPGA 2006»
14 years 26 days ago
A reconfigurable architecture for network intrusion detection using principal component analysis
In this paper, we develop an architecture for principal component analysis (PCA) to be used as an outlier detection method for high-speed network intrusion detection systems (NIDS...
David T. Nguyen, Gokhan Memik, Alok N. Choudhary
BIS
2008
119views Business» more  BIS 2008»
13 years 10 months ago
Influence Factors of Understanding Business Process Models
The increasing utilization of business process models both in business analysis and information systems development raises several issues regarding quality measures. In this contex...
Jan Mendling, Mark Strembeck
FORTE
2010
13 years 10 months ago
Logics for Contravariant Simulations
Abstract. Covariant-contravariant simulation and conformance simulation are two generalizations of the simple notion of simulation which aim at capturing the fact that it is not al...
Ignacio Fábregas, David de Frutos-Escrig, M...