Sciweavers

82 search results - page 13 / 17
» Source-Based Software Risk Assessment
Sort
View
BMCBI
2008
143views more  BMCBI 2008»
13 years 11 months ago
catmap: Case-control And TDT Meta-Analysis Package
Background: Risk for complex disease is thought to be controlled by multiple genetic risk factors, each with small individual effects. Meta-analyses of several independent studies...
Kristin K. Nicodemus
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 5 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 5 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis
ICSE
2003
IEEE-ACM
14 years 11 months ago
Cost Estimation for Web Applications
In this paper, we investigate the application of the COBRATM method (Cost Estimation, Benchmarking, and Risk Assessment) in a new application domain, the area of web development. ...
Melanie Ruhe, D. Ross Jeffery, Isabella Wieczorek
SCAM
2003
IEEE
14 years 4 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef