Sciweavers

1653 search results - page 283 / 331
» Timed analysis of security protocols
Sort
View
MSWIM
2006
ACM
14 years 2 months ago
Performance modeling of critical event management for ubiquitous computing applications
A generic theoretical framework for managing critical events in ubiquitous computing systems is presented. The main idea is to automatically respond to occurrences of critical eve...
Tridib Mukherjee, Krishna M. Venkatasubramanian, S...
MINENET
2005
ACM
14 years 2 months ago
Learning-based anomaly detection in BGP updates
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Jian Zhang, Jennifer Rexford, Joan Feigenbaum
ADBIS
2004
Springer
94views Database» more  ADBIS 2004»
14 years 17 days ago
Formalization and Detection of Events over a Sliding Window in Active Databases Using Interval-Based Semantics
Trend analysis and forecasting applications (e.g., securities trading, stock market, and after-the-fact diagnosis) need event detection along a moving time window. Event-driven app...
Raman Adaikkalavan, Sharma Chakravarthy
ISSTA
2010
ACM
14 years 21 days ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
ESORICS
2008
Springer
13 years 10 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...