Sciweavers

83 search results - page 13 / 17
» Deviation Analysis Through Model Checking
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares
— High-speed backbones are regularly affected by various kinds of network anomalies, ranging from malicious attacks to harmless large data transfers. Different types of anomalies...
Tarem Ahmed, Mark Coates, Anukool Lakhina
ISSTA
2009
ACM
14 years 2 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan
CSFW
1999
IEEE
14 years 1 days ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
CIA
2004
Springer
14 years 1 months ago
Agent's Multiple Inquiries for Enhancing the Partnership Formation Process
The concept of sequential two-sided search is widely used in partnerships formation applications in various domains. However, when considering the implementation of the method in M...
David Sarne, Sarit Kraus
DSN
2003
IEEE
14 years 1 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...