Sciweavers

2588 search results - page 437 / 518
» Project risk management
Sort
View
VIZSEC
2004
Springer
14 years 1 months ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
ANSS
2003
IEEE
14 years 1 months ago
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks
The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based DoS attacks. Our strategy employs three lin...
Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb...
APSEC
2003
IEEE
14 years 1 months ago
An XVCL Approach to Handling Variants: A KWIC Product Line Example
We developed XVCL (XML-based Variant Configuration Language), a method and tool for product lines, to facilitate handling variants in reusable software assets (such as architectur...
Hongyu Zhang, Stan Jarzabek
DATE
2003
IEEE
115views Hardware» more  DATE 2003»
14 years 1 months ago
Embedded Software in Digital AM-FM Chipset
The new standard DRM for digital radio broadcast in AM band requires integrated devices for radio receivers at low cost and very low power consumption. A chipset is currently desi...
Michel Sarlotte, Bernard Candaele, J. Quevremont, ...
DISCEX
2003
IEEE
14 years 1 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann