Sciweavers

11603 search results - page 64 / 2321
» Securing Embedded Systems
Sort
View
133
Voted
ISSE
2011
14 years 9 months ago
Representativeness models of systems: smart grid example
Norman F. Schneidewind
92
Voted
IJNSEC
2007
121views more  IJNSEC 2007»
15 years 2 months ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen
126
Voted
CCS
2009
ACM
16 years 2 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov
130
Voted
OOPSLA
2000
Springer
15 years 5 months ago
A real world object modeling method for creating simulation environment of real-time systems
Most real-time embedded control software feature complex interactions with asynchronous inputs and environment objects, and a meaningful simulation of a real-time control software...
Ji Y. Lee, Hye J. Kim, Kyo Chul Kang
115
Voted
PDCAT
2007
Springer
15 years 8 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling