Sciweavers

1424 search results - page 279 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
RPTEL
2006
96views more  RPTEL 2006»
13 years 7 months ago
Supporting Self-Directed Learners and Learning Communities with Sociotechnical Environments
Making learning part of life is an essential challenge for inventing the future of our societies. Lifelong learning is a necessity rather than a possibility or a luxury to be cons...
Gerhard Fischer, Masanori Sugimoto
CCS
2009
ACM
14 years 1 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
IWPSE
2007
IEEE
14 years 1 months ago
Talking tests: an empirical assessment of the role of fit acceptance tests in clarifying requirements
The starting point for software evolution is usually a change request, expressing the new or updated requirements on the delivered system. The requirements specified in a change ...
Filippo Ricca, Marco Torchiano, Mariano Ceccato, P...
RTCSA
2007
IEEE
14 years 1 months ago
A Real-Time Database Testbed and Performance Evaluation
A lot of real-time database (RTDB) research has been done to process transactions in a timely fashion using fresh data reflecting the current real world status. However, most exi...
Kyoung-Don Kang, Phillip H. Sin, Jisu Oh
ASPLOS
2006
ACM
14 years 1 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou