Sciweavers

274 search results - page 4 / 55
» Improving vulnerability discovery models
Sort
View
CN
2007
80views more  CN 2007»
13 years 6 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
ESSOS
2009
Springer
14 years 1 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
JCIT
2010
197views more  JCIT 2010»
13 years 1 months ago
Reputation Improved Web Services Discovery Based on QoS
With an expanding of Web services giving same functionalities, Quality of Service (QoS) is becoming an important criterion for selection of the best available service. So users ne...
Reihaneh Khorsand Motlagh Esfahani, Farhad Mardukh...
BMCBI
2007
145views more  BMCBI 2007»
13 years 6 months ago
Improved benchmarks for computational motif discovery
Background: An important step in annotation of sequenced genomes is the identification of transcription factor binding sites. More than a hundred different computational methods h...
Geir Kjetil Sandve, Osman Abul, Vegard Walseng, Fi...