Sciweavers

135 search results - page 23 / 27
» Refactoring Tools and Complementary Techniques
Sort
View
ACSAC
2008
IEEE
14 years 1 months ago
Anti-Phishing in Offense and Defense
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
Chuan Yue, Haining Wang
GLVLSI
2008
IEEE
120views VLSI» more  GLVLSI 2008»
14 years 1 months ago
SAT-based equivalence checking of threshold logic designs for nanotechnologies
Novel nano-scale devices have shown promising potential to overcome physical barriers faced by complementary metaloxide semiconductor (CMOS) technology in future circuit design. H...
Yexin Zheng, Michael S. Hsiao, Chao Huang
NOMS
2008
IEEE
141views Communications» more  NOMS 2008»
14 years 1 months ago
Detecting BGP anomalies with wavelet
—In this paper, we propose a BGP anomaly detection framework called BAlet that delivers both temporal and spatial localization of the potential anomalies. It requires only a simp...
Jianning Mai, Lihua Yuan, Chen-Nee Chuah
APSEC
2005
IEEE
14 years 29 days ago
Ontology-based Active Requirements Engineering Framework
Software-intensive systems are systems of systems that rely on complex interdependencies among themselves as well as with their operational environment to satisfy the required beh...
Seok Won Lee, Robin A. Gandhi
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 22 days ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...