Sciweavers

35 search results - page 5 / 7
» Towards a Model-Checker for Counter Systems
Sort
View
CCS
2009
ACM
14 years 1 months ago
Towards secure dataflow processing in open distributed systems
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
PTS
2007
120views Hardware» more  PTS 2007»
13 years 8 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
13 years 12 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
ILC
2007
Springer
14 years 22 days ago
Towards Model-Checking Programs with Lists
Abstract. We aim at checking safety and temporal properties over models representing the behavior of programs manipulating dynamic singly-linked lists. The properties we consider n...
Alain Finkel, Étienne Lozes, Arnaud Sangnie...
RAID
1999
Springer
13 years 11 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield