Sciweavers

220 search results - page 9 / 44
» Metamorphic Testing and Beyond
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
ICSE
2000
IEEE-ACM
14 years 1 months ago
Multibook's test environment
Well engineered Web based courseware and exercises provide flexibility and added value to the students, which goes beyond the traditional text book or CD-ROM based courses. The Mu...
Nathalie Poerwantoro, Abdulmotaleb El-Saddik, Bern...
FLAIRS
2008
13 years 12 months ago
Alignment of Heterogeneous Ontologies: A Practical Approach to Testing for Similarities and Discrepancies
Ontology alignment is regarded as one of the core tasks in many Web services. It is concerned with finding the correspondences between separate ontologies by identifying concepts ...
Neli P. Zlatareva, Maria Nisheva
SDL
2001
73views Hardware» more  SDL 2001»
13 years 11 months ago
HyperMSCs with Connectors for Advanced Visual System Modelling and Testing
Experiences with the use of the MSC language for complex system specifications have shown that certain extensions are necessary in order to arrive at sufficiently transparent and m...
Jens Grabowski, Peter Graubmann, Ekkart Rudolph
CCS
2007
ACM
14 years 1 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...