Sciweavers

741 search results - page 112 / 149
» Tools and techniques for Network Forensics
Sort
View
NDSS
2008
IEEE
14 years 3 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
RAID
2007
Springer
14 years 3 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
LCTRTS
2001
Springer
14 years 1 months ago
Middleware For Building Adaptive Systems Via Configuration
1 COTS (commercial off-the-shelf) devices are capable of executing powerful, distributed algorithms. Very large, adaptive systems can be created by simply integrating these devices...
Sanjai Narain, Ravichander Vaidyanathan, Stanley M...
WOSP
2005
ACM
14 years 2 months ago
From UML to LQN by XML algebra-based model transformations
The change of focus from code to models promoted by OMG's Model Driven Development raises the need for verification of nonfunctional characteristics of UML models, such as pe...
Gordon Ping Gu, Dorina C. Petriu
SIGMETRICS
2005
ACM
14 years 2 months ago
End-to-end estimation of the available bandwidth variation range
The available bandwidth (avail-bw) of a network path is an important performance metric and its end-to-end estimation has recently received significant attention. Previous work f...
Manish Jain, Constantinos Dovrolis