Sciweavers

839 search results - page 132 / 168
» Development of an Evaluation Method for Office Work Producti...
Sort
View
ACSAC
2008
IEEE
14 years 3 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ELPUB
2006
ACM
14 years 2 months ago
The Text Encoding Initiative Anno 2005: An Orientation and Workshop
The Text Encoding Initiative is an international and interdisciplinary standards project established in 1987 to develop, maintain and promulgate hardware- and software-independent...
Lou Burnard, Matthew Driscoll
SPIN
2005
Springer
14 years 1 months ago
Behavioural Models for Hierarchical Components
We describe a method for the specification and verification of the dynamic behaviour of component systems. Building applications using a component framework allows the developers...
Tomás Barros, Ludovic Henrio, Eric Madelain...
ACSAC
1998
IEEE
14 years 23 days ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
ESEC
1997
Springer
14 years 1 days ago
Cryptographic Verification of Test Coverage Claims
The market for software components is growing, driven on the "demand side" by the need for rapid deployment of highly functional products, and on the "supply side&q...
Premkumar T. Devanbu, Stuart G. Stubblebine