Sciweavers

641 search results - page 22 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
ESORICS
2010
Springer
13 years 8 months ago
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
Sambuddho Chakravarty, Angelos Stavrou, Angelos D....
SERA
2010
Springer
13 years 6 months ago
Representing Unique Stakeholder Perspectives in BPM Notations
—Evidence shows that proposals for new modeling notations emerge and evolution of current ones are becoming more complex, often in an attempt to satisfy the many different modeli...
Carlos Monsalve, Alain April, Alain Abran
ITCC
2005
IEEE
14 years 1 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
ACSAC
2006
IEEE
14 years 1 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
IJSS
2007
82views more  IJSS 2007»
13 years 7 months ago
A holistic method for finding out critical features of industry maintenance services
— The purpose of this case study is to create a competitive operative management system for efficiency and quality performance for a company running maintenance service business ...
Juha-Matti Ranta, Josu Takala