Sciweavers

360 search results - page 25 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
TSE
1998
129views more  TSE 1998»
13 years 7 months ago
Inferring Declarative Requirements Specifications from Operational Scenarios
—Scenarios are increasingly recognized as an effective means for eliciting, validating, and documenting software requirements. This paper concentrates on the use of scenarios for...
Axel van Lamsweerde, Laurent Willemet
PTS
1993
91views Hardware» more  PTS 1993»
13 years 9 months ago
Generating Tests for Control Portion of SDL Specifications
The signal SAVE construct is one of the features distinguishing SDL from convent specification and programming languages. On the other hand, this feature increase testing SDL-spec...
Gang Luo, Anindya Das, Gregor von Bochmann
SIGSOFT
2007
ACM
14 years 8 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
RAID
2001
Springer
14 years 11 days ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
CORR
2010
Springer
93views Education» more  CORR 2010»
13 years 8 months ago
Support for Evolving Software Architectures in the ArchWare ADL
Software that cannot evolve is condemned to atrophy: it cannot accommodate the constant revision and renegotiation of its business goals nor intercept the potential of new technol...
Ronald Morrison, Graham N. C. Kirby, Dharini Balas...