Sciweavers

17 search results - page 4 / 4
» DENOFAS: A Vulnerability Assessment Tool
Sort
View
ICSE
2008
IEEE-ACM
14 years 11 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
BCS
2008
14 years 9 days ago
Hardware Dependability in the Presence of Soft Errors
Using formal verification for designing hardware designs free from logic design bugs has been an active area of research since the last 15 years. Technology has matured and we hav...
Ashish Darbari, Bashir M. Al-Hashimi