Sciweavers

1005 search results - page 147 / 201
» Information systems security engineering: a critical compone...
Sort
View
CCR
2002
113views more  CCR 2002»
13 years 8 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
CSMR
2009
IEEE
14 years 1 months ago
Software Clustering Using Dynamic Analysis and Static Dependencies
Decomposing a software system into smaller, more manageable clusters is a common approach to support the comprehension of large systems. In recent years, researchers have focused ...
Chiragkumar Patel, Abdelwahab Hamou-Lhadj, Juergen...
SEKE
2005
Springer
14 years 2 months ago
Service Identification and Packaging in Service Oriented Reengineering
With the adoption to Web service technologies, more and more existing non-service-oriented software systems turn to be legacy systems. They require a service-oriented reengineerin...
Zhuopeng Zhang, Ruimin Liu, Hongji Yang
ISW
2007
Springer
14 years 3 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
ASPLOS
2011
ACM
13 years 14 days ago
S2E: a platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software systems. We demonstrate S2E’s use in developing practical tools for comprehensive perfo...
Vitaly Chipounov, Volodymyr Kuznetsov, George Cand...