Sciweavers

44 search results - page 6 / 9
» Using equivalence-checking to verify robustness to denial of...
Sort
View
DSN
2008
IEEE
14 years 1 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
14 years 1 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
ATAL
2003
Springer
14 years 20 days ago
Robust software via agent-based redundancy
This paper describes how multiagent systems can be used to achieve robust software, one of the major goals of software engineering. The paper first positions itself within the sof...
Michael N. Huhns, Vance T. Holderfield, Rosa Laura...
GLOBECOM
2009
IEEE
14 years 2 months ago
Evaluating DoS Attacks against Sip-Based VoIP Systems
Abstract—The multimedia communication is rapidly converging towards Voice over Internet – commonly known as Voice over Internet Protocol (VoIP). Session Initiation Protocol (SI...
M. Zubair Rafique, M. Ali Akbar, Muddassar Farooq
ACL
2010
13 years 5 months ago
Using Speech to Reply to SMS Messages While Driving: An In-Car Simulator User Study
Speech recognition affords automobile drivers a hands-free, eyes-free method of replying to Short Message Service (SMS) text messages. Although a voice search approach based on te...
Yun-Cheng Ju, Tim Paek