Sciweavers

1424 search results - page 61 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ICPR
2004
IEEE
14 years 9 months ago
Car Detection Based on Multi-Cues Integration
In this paper we present a novel fast multi-cues based car detection technique in still outdoor images. On the bottom level, two novel area templates based on edge cue and interes...
Hanqing Lu, James Hu, Keiichi Uchimura, Zhenfeng Z...
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 2 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
AINA
2007
IEEE
14 years 2 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
JUCS
2008
130views more  JUCS 2008»
13 years 8 months ago
Experimenting the Automated Selection of COTS Components Based on Cost and System Requirements
: In a component-based development process the selection of components is an activity that takes place over multiple lifecycle phases that span from requirement specifications thro...
Vittorio Cortellessa, Ivica Crnkovic, Fabrizio Mar...
CAISE
2009
Springer
14 years 2 months ago
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Haralambos Mouratidis, Ali Sunyaev, Jan Jürje...