Sciweavers

752 search results - page 19 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
KDD
2005
ACM
169views Data Mining» more  KDD 2005»
14 years 8 months ago
Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation
Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. These vulnerabilities mostly emanate from the open nature of such systems ...
Bamshad Mobasher, Robin D. Burke, Chad Williams, R...
FMCO
2003
Springer
154views Formal Methods» more  FMCO 2003»
14 years 1 months ago
Tools for Generating and Analyzing Attack Graphs
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
Oleg Sheyner, Jeannette M. Wing
SERP
2007
13 years 10 months ago
From Functional Requirements through Test Evaluation Design to Automatic Test Data Patterns Retrieval - a Concept for Testing of
- Functional testing of software dedicated for hybrid embedded systems should start at the early development phase and requires analysis of discrete and continuous signals, where t...
Justyna Zander-Nowicka, Abel Marrero Pérez,...
ACSAC
1999
IEEE
14 years 23 days ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
CAISE
2004
Springer
14 years 1 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau