Sciweavers

355 search results - page 15 / 71
» Security Test Generation Using Threat Trees
Sort
View
MEDIAFORENSICS
2010
13 years 11 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
OOPSLA
2007
Springer
14 years 4 months ago
CUTE: C++ unit testing easier
This article describes the design and use of the CUTE C++ testing framework and its integration into the Eclipse C++ Development Tooling. Unit testing supports code quality and is...
Peter Sommerlad, Emanuel Graf
ISMVL
1997
IEEE
82views Hardware» more  ISMVL 1997»
14 years 2 months ago
Finding Composition Trees for Multiple-Valued Functions
The composition tree of a given function, when it exists, provides a representation of the function revealing all possible disjunctive decompositions, thereby suggesting a realiza...
Elena Dubrova, Jon C. Muzio, Bernhard von Stengel
BROADNETS
2007
IEEE
14 years 4 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang
ADHOCNOW
2008
Springer
14 years 4 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli