Sciweavers

45 search results - page 6 / 9
» Penetration Testing: A Duet
Sort
View
IPSN
2007
Springer
14 years 1 months ago
An empirical study of collaborative acoustic source localization
— Field biologists use animal sounds to discover the presence of individuals and to study their behavior. Collecting bio-acoustic data has traditionally been a difficult and tim...
Andreas M. Ali, Kung Yao, Travis C. Collier, Charl...
ACSAC
2007
IEEE
14 years 1 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
ICRA
2010
IEEE
130views Robotics» more  ICRA 2010»
13 years 6 months ago
All-weather perception for man-portable robots using ultra-wideband radar
—Autonomous man-portable robots have the potential to provide a wide range of new capabilities for both military and civilian applications. Previous research in autonomy for smal...
Brian Yamauchi
ICSM
2002
IEEE
14 years 11 days ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
TCS
2002
13 years 7 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer