Sciweavers

525 search results - page 17 / 105
» Using Checkable Types in Automatic Protocol Analysis
Sort
View
JUCS
2010
139views more  JUCS 2010»
13 years 2 months ago
Validating Modal Aspects of OntoUML Conceptual Models Using Automatically Generated Visual World Structures
: Assessing the quality of conceptual models is key to ensure that conceptual models can be used effectively as a basis for understanding, agreement and construction of information...
Alessander Botti Benevides, Giancarlo Guizzardi, B...
ACSAC
2004
IEEE
13 years 11 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
ASIACRYPT
2008
Springer
13 years 9 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
JAIR
2007
132views more  JAIR 2007»
13 years 7 months ago
Using Linguistic Cues for the Automatic Recognition of Personality in Conversation and Text
It is well known that utterances convey a great deal of information about the speaker in addition to their semantic content. One such type of information consists of cues to the s...
François Mairesse, Marilyn A. Walker, Matth...
ECCV
2004
Springer
14 years 1 months ago
Statistical Imaging for Modeling and Identification of Bacterial Types
An automatic tool is developed to identify microbiological data types using computer-vision and statistical modeling techniques. In bacteriophage (phage) typing, representative pro...
Sigal Trattner, Hayit Greenspan, Gabi Tepper, Shim...