Sciweavers

258 search results - page 44 / 52
» Faults' context matters
Sort
View
DSN
2009
IEEE
14 years 2 months ago
Data management mechanisms for embedded system gateways
It is becoming increasingly common to connect traditional embedded system networks to the Internet for remote monitoring, high-level control and integration. It is necessary to pr...
Justin Ray, Philip Koopman
IWSEC
2009
Springer
14 years 2 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
COMPSAC
2008
IEEE
14 years 1 months ago
Error Modeling in Dependable Component-Based Systems
Component-Based Development (CBD) of software, with its successes in enterprise computing, has the promise of being a good development model due to its cost effectiveness and pote...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...
DEPCOS
2008
IEEE
180views Hardware» more  DEPCOS 2008»
14 years 1 months ago
A Resilient SIL 2 Driver Machine Interface for Train Control Systems
In railway train-borne equipment, the Driver Machine Interface (DMI) acts like a bridge between the train driver and the onboard automatic train control system (European Vital Com...
Andrea Ceccarelli, István Majzik, Danilo Io...
ACSAC
2007
IEEE
14 years 1 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...