Sciweavers

861 search results - page 16 / 173
» Predicting Attack-prone Components
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
PhishNet: Predictive Blacklisting to Detect Phishing Attacks
—Phishing has been easy and effective way for trickery and deception on the Internet. While solutions such as URL blacklisting have been effective to some degree, their reliance ...
Pawan Prakash, Manish Kumar, Ramana Rao Kompella, ...
EWC
2007
60views more  EWC 2007»
13 years 7 months ago
A simulation-based design paradigm for complex cast components
This paper describes and exercises a new design paradigm for cast components. The methodology integrates foundry process simulation, non-destructive evaluation (nde), stress analys...
Stéphane P. A. Bordas, James G. Conley, Bri...
CBSE
2008
Springer
13 years 9 months ago
Life-Cycle Aware Modelling of Software Components
Current software component models insufficiently reflect the different stages of component life-cycle, which involves design, implementation, deployment, and runtime. Therefore, re...
Heiko Koziolek, Steffen Becker, Jens Happe, Ralf R...
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 1 months ago
Using Software Component Models and Services in Embedded Real-Time Systems
While the use of software component models has become popular in the development of desktop applications and distributed information systems, such models have not been widely used...
Frank Lüders, Shoaib Ahmad, Faisal Khizer, Gu...
IPPS
2007
IEEE
14 years 1 months ago
Experiments with a Software Component Enabling NetSolve with Direct Communications in a Non-Intrusive and Incremental Way
The paper presents a software component that enables NetSolve with direct communications between servers in a non-intrusive and incremental way. Non-intrusiveness means that the s...
Xin Zuo, Alexey L. Lastovetsky