Sciweavers

4307 search results - page 145 / 862
» Dynamic Spyware Analysis
Sort
View
ICSE
2004
IEEE-ACM
14 years 10 months ago
Static Checking of Dynamically Generated Queries in Database Applications
Many data-intensive applications dynamically construct queries in response to client requests and execute them. Java servlets, e.g., can create string representations of SQL queri...
Carl Gould, Zhendong Su, Premkumar T. Devanbu
ISI
2004
Springer
14 years 3 months ago
Analyzing and Visualizing Criminal Network Dynamics: A Case Study
Dynamic criminal network analysis is important for national security but also very challenging. However, little research has been done in this area. In this paper we propose to use...
Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, H...
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
14 years 4 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...
HYBRID
2009
Springer
14 years 2 months ago
Specification and Analysis of Network Resource Requirements of Control Systems
We focus on control systems in which sensors send data to actuators via a bus shared with other applications. An approach is proposed for specifying and implementing dynamic schedu...
Gera Weiss, Sebastian Fischmeister, Madhukar Anand...
WSC
2007
14 years 17 days ago
An initial simulation model for aiding policy analysis in urban insurgencies
This paper aims to demonstrate the potential for using the system dynamics computer simulation methodology to gain insight into the evolution of insurgencies. In particular, it ex...
Edward G. Anderson Jr.