Sciweavers

118 search results - page 21 / 24
» Meca: A Tool for Access Control Models
Sort
View
ACSAC
2007
IEEE
14 years 4 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
IPCCC
2006
IEEE
14 years 3 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
HYBRID
2010
Springer
14 years 2 months ago
Safe compositional network sketches: formal framework
NetSketch is a tool for the specification of constrained-flow applications and the certification of desirable safety properties imposed thereon. NetSketch assists system integr...
Azer Bestavros, Assaf J. Kfoury, Andrei Lapets, Mi...
BMCBI
2007
104views more  BMCBI 2007»
13 years 9 months ago
TISs-ST: a web server to evaluate polymorphic translation initiation sites and their reflections on the secretory targets
Background: The nucleotide sequence flanking the translation initiation codon (start codon context) affects the translational efficiency of eukaryotic mRNAs, and may indicate the ...
Renato Vicentini, Marcelo Menossi
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
14 years 11 months ago
Optimal Boolean Matrix Decomposition: Application to Role Engineering
Abstract-- A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solut...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri