Sciweavers

2079 search results - page 262 / 416
» Quantifying Information Flow
Sort
View
CC
2008
Springer
138views System Software» more  CC 2008»
14 years 8 days ago
Improved Memory-Access Analysis for x86 Executables
Over the last seven years, we have developed static-analysis methods to recover a good approximation to the variables and dynamically allocated memory objects of a stripped executa...
Thomas W. Reps, Gogul Balakrishnan
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
13 years 11 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
CAISE
2010
Springer
13 years 11 months ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song
ETM
2010
257views Economy» more  ETM 2010»
13 years 11 months ago
Implementation and Performance Evaluation of the re-ECN Protocol
Re-inserted ECN (re-ECN) is a proposed TCP/IP extension that informs the routers on a path about the estimated level of congestion. The re-ECN protocol extends the Explicit Congest...
Mirja Kühlewind, Michael Scharf
CSREASAM
2009
13 years 11 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton