Sciweavers

438 search results - page 36 / 88
» Defending Critical Infrastructure
Sort
View
ICSE
2000
IEEE-ACM
14 years 11 days ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
WSC
2004
13 years 10 months ago
Using Simulated Data in Support of Research on Regression Analysis
Using simulated data to develop and study diagnostic tools for data analysis is very beneficial. The user can gain insight about what happens when assumptions are violated since t...
Christopher Michael Hill, Linda C. Malone
DIMVA
2008
13 years 10 months ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar
HICSS
2006
IEEE
113views Biometrics» more  HICSS 2006»
14 years 2 months ago
Examining Cross-Agency Collaborations in E-Government Initiatives
Cross-agency collaborations are critical to the success of e-government, which has great potential to transform the way that governments work, share information and deliver servic...
Paul Jen-Hwa Hu, Dai Cui, Alan Charles Sherwood
IEEEARES
2006
IEEE
14 years 2 months ago
Evaluation of Network Robustness for Given Defense Resource Allocation Strategies
Since the 9/11 terrorist attacks, the effective and efficient protection of critical information infrastructures has become an even more important issue. To enhance network surviv...
Y.-S. Lin, P.-H. Tsang, C.-H. Chen, C.-L. Tseng, Y...