Sciweavers

529 search results - page 55 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
WCRE
2005
IEEE
14 years 1 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 7 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
ICPR
2004
IEEE
14 years 8 months ago
Recognition of Unconstrained Legal Amounts Handwritten on Chinese Bank Checks
This paper presents a novel research investigation on legal amount recognition of unconstrained cursive handwritten Chinese character in the environment of A2iA CheckReaderTM ? a ...
Ching Y. Suen, Emmanuel Augustin, Hanshen Tang, Mo...
IPPS
1998
IEEE
13 years 12 months ago
Self-Testing Fault-Tolerant Real-Time Systems
We propose a periodic diagnostic algorithm based on the testing model of computation for real-time systems. The diagnostic task runs on every processor of the system. When the task...
M. Rooholamini, Seyed H. Hosseini