Sciweavers

443 search results - page 43 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
143
Voted
CMS
2010
150views Communications» more  CMS 2010»
15 years 2 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 8 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
118
Voted
WER
2007
Springer
15 years 8 months ago
Test-case Driven versus Checklist-based Inspections of Software Requirements - An Experimental Evaluation
Software inspections have proved to be an effective means to find faults in different software artifacts, and the application of software inspections on requirements specification...
Nina Dzamashvili-Fogelström, Tony Gorschek
98
Voted
SASO
2009
IEEE
15 years 9 months ago
Teleological Software Adaptation
—We examine the use of teleological metareasoning for self-adaptation in game-playing software agents. The goal of our work is to develop an interactive environment in which the ...
Joshua Jones, Chris Parnin, Avik Sinharoy, Spencer...
ISBI
2004
IEEE
16 years 3 months ago
A Software Package for Portable Three-Dimensional Ultrasound Imaging
Currently, portable ultrasound units lack 3-dimensional (3D) image display, limiting their usefulness especially under hostile operating environments where information must be int...
Tiantian Zhang, X. Xu, Xinlin Chen