Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
The changing competitive landscape has brought new forces to bear on the manner in which new products are developed. These forces have put the creation and dissemination of knowle...
Distributed real-time applications have presented the need to extend the Object Management Group's OMG Common Object Request Broker Architecture CORBA standard to support rea...
Lisa Cingiser DiPippo, Victor Fay Wolfe, Roman Gin...
This paper investigates the problem of designing decentralized representations to support monitoring and inferences in sensor networks. State-space models of physical phenomena su...
Juan Liu, Maurice Chu, Jie Liu, Jim Reich, Feng Zh...