Sciweavers

817 search results - page 143 / 164
» Malware behaviour analysis
Sort
View
APSEC
2007
IEEE
14 years 2 months ago
Definition of an Executable SPEM 2.0
One major advantage of executable models is that once constructed, they can be run, checked, validated and improved in short incremental and iterative cycles. In the field of Soft...
Reda Bendraou, Benoît Combemale, Xavier Cr&e...
ISARCS
2010
141views Hardware» more  ISARCS 2010»
14 years 2 months ago
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Ricardo J. Rodríguez, José Merseguer
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
14 years 2 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
ACSAC
2004
IEEE
14 years 2 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
ASWEC
2004
IEEE
14 years 2 months ago
Teaching the Process of Code Review
Behavioural theory predicts that interventions that improving individual reviewers' expertise improves Software Development Technical Review group performance [3, p 6]. This ...
Tor Stålhane, Cat Kutay, Hiyam Al-Kilidar, D...