Sciweavers

5665 search results - page 1084 / 1133
» Introduction to Computer Security
Sort
View
131
Voted
NDSS
2008
IEEE
15 years 8 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
114
Voted
ACSC
2007
IEEE
15 years 8 months ago
Periodical Payment Model Using Restricted Proxy Certificates
In this paper we shall introduce a new electronic payment concept based on the popular direct debit payment model, entitled periodical payments. The direct debit model currently i...
Grigori Goldman
98
Voted
NDSS
2007
IEEE
15 years 8 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
116
Voted
TCC
2007
Springer
100views Cryptology» more  TCC 2007»
15 years 8 months ago
Private Approximation of Clustering and Vertex Cover
Private approximation of search problems deals with finding approximate solutions to search problems while disclosing as little information as possible. The focus of this work is ...
Amos Beimel, Renen Hallak, Kobbi Nissim
134
Voted
VIZSEC
2007
Springer
15 years 8 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
« Prev « First page 1084 / 1133 Last » Next »