Sciweavers

8503 search results - page 1469 / 1701
» Secure Software Architectures
Sort
View
IEEESCC
2008
IEEE
14 years 4 months ago
Built-to-Order Service Engineering for Enterprise IT Discovery
Enterprise IT environments are complex: business applications rely on distributed middleware running on diverse hardware with components depending on each other in many unexpected...
Nikolai Joukov, Murthy V. Devarakonda, Kostas Mago...
SADFE
2008
IEEE
14 years 4 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo
INFOCOM
2007
IEEE
14 years 4 months ago
An Open and Scalable Emulation Infrastructure for Large-Scale Real-Time Network Simulations
— We present a software infrastructure that embeds physical hosts in a simulated network. Aiming to create a largescale real-time virtual network testbed, our real-time interacti...
Jason Liu, Scott Mann, Nathanael Van Vorst, Keith ...
GPCE
2007
Springer
14 years 4 months ago
Preventing injection attacks with syntax embeddings
Software written in one language often needs to construct sentences in another language, such as SQL queries, XML output, or shell command invocations. This is almost always done ...
Martin Bravenboer, Eelco Dolstra, Eelco Visser
ICICS
2007
Springer
14 years 4 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
« Prev « First page 1469 / 1701 Last » Next »