Sciweavers

355 search results - page 5 / 71
» Security Test Generation Using Threat Trees
Sort
View
KI
2004
Springer
14 years 3 months ago
Generation of Sentence Parse Trees Using Parts of Speech
This paper proposes a new corpus-based approach for deriving syntactic structures and generating parse trees of natural language sentences. The parts of speech (word categories) of...
Tunga Güngör
TRUSTBUS
2004
Springer
14 years 3 months ago
Privacy Preserving Data Generation for Database Application Performance Testing
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Yongge Wang, Xintao Wu, Yuliang Zheng
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 10 months ago
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third gener...
R. Shankar, Timothy Rajkumar, P. Dananjayan
ICPR
2002
IEEE
14 years 2 months ago
Uniformity Testing Using Minimal Spanning Tree
Testing for uniformity of multivariate data is the initial step in exploratory pattern analysis. We propose a new uniformity testing method, which first computes the maximum (sta...
Anil K. Jain, Xiaowei Xu, Tin Kam Ho, Fan Xiao
IJSNET
2007
91views more  IJSNET 2007»
13 years 10 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...