Sciweavers

495 search results - page 68 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
IEEEARES
2010
IEEE
14 years 4 months ago
Security and Usability: Analysis and Evaluation
Abstract—The differences between the fields of HumanComputer Interaction and Security (HCISec) and HumanComputer Interaction (HCI) have not been investigated very closely. Many ...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
DSN
2008
IEEE
14 years 4 months ago
Automatic security assessment of critical cyber-infrastructures
This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
Zahid Anwar, Ravinder Shankesi, Roy H. Campbell
WWW
2004
ACM
14 years 10 months ago
CTR-S: a logic for specifying contracts in semantic web services
A requirements analysis in the emerging field of Semantic Web Services (SWS) (see http://daml.org/services/swsl/requirements/) has identified four major areas of research: intelli...
Hasan Davulcu, Michael Kifer, I. V. Ramakrishnan
BMCBI
2010
113views more  BMCBI 2010»
13 years 9 months ago
Use of historic metabolic biotransformation data as a means of anticipating metabolic sites using MetaPrint2D and Bioclipse
Background: Predicting metabolic sites is important in the drug discovery process to aid in rapid compound optimisation. No interactive tool exists and most of the useful tools ar...
Lars Carlsson, Ola Spjuth, Samuel Adams, Robert C....
PROFES
2004
Springer
14 years 3 months ago
Using Software Inspection as a Catalyst for SPI in a Small Company
Process improvement activities in small and medium size enterprises (SME) are challenging due to small number of personnel and projects, people have to perform in a variety of role...
Lasse Harjumaa, Ilkka Tervonen, Pekka Vuorio