Sciweavers

355 search results - page 18 / 71
» Security Test Generation Using Threat Trees
Sort
View
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
14 years 4 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
ICMCS
2006
IEEE
148views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Hierarchical Load Testing Architecture using Large Scale Virtual Clients
In this work, we develop a hierarchical load testing architecture using large scale virtual clients to reduce the testing time and ensure the stability of the server for distribut...
Bum Lim, Jin Kim, Kwang Shim
ESAS
2004
Springer
14 years 3 months ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
APAQS
2001
IEEE
14 years 1 months ago
End-to-End Integration Testing
Integration testing has always been a challenge especially if the system under test is large with many subsystems and interfaces. This paper proposes an approach to design End-toE...
Raymond A. Paul
IFL
2005
Springer
14 years 3 months ago
Polytypic Syntax Tree Operations
Polytypic functional programming has the advantage that it can derive code for generic functions automatically. However, it is not clear whether it is useful for anything other tha...
Arjen van Weelden, Sjaak Smetsers, Rinus Plasmeije...