Sciweavers

355 search results - page 48 / 71
» Security Test Generation Using Threat Trees
Sort
View
133
Voted
SP
2002
IEEE
147views Security Privacy» more  SP 2002»
15 years 2 months ago
CX: A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks...
Peter R. Cappello, Dimitros Mourloukos
INFOCOM
2009
IEEE
15 years 9 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
145
Voted
ESORICS
2011
Springer
14 years 2 months ago
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data
The rapid progress of human genome studies leads to a strong demand of aggregate human DNA data (e.g, allele frequencies, test statistics, etc.), whose public dissemination, howeve...
Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen...
144
Voted
OOPSLA
2010
Springer
15 years 21 days ago
Towards a tool-based development methodology for sense/compute/control applications
This poster presents a design language and a tool suite covering the development life-cycle of a Sense/Compute/Control (SCC) application. This language makes it possible to define...
Damien Cassou, Julien Bruneau, Julien Mercadal, Qu...
120
Voted
SIGCSE
2008
ACM
169views Education» more  SIGCSE 2008»
15 years 2 months ago
APOGEE: automated project grading and instant feedback system for web based computing
Providing consistent, instant, and detailed feedback to students has been a big challenge in teaching Web based computing, given the complexity of project assignments and the comp...
Xiang Fu, Boris Peltsverger, Kai Qian, Lixin Tao, ...