Sciweavers

269 search results - page 39 / 54
» Using model-based security analysis in component-oriented sy...
Sort
View
ISPW
2007
IEEE
14 years 1 months ago
Comparative Experiences with Electronic Process Guide Generator Tools
The primary objective of all software engineering courses is to help students learn how to develop successful software systems with good software engineering practices. Various too...
Monvorath Phongpaibul, Supannika Koolmanojwong, Al...
ACSAC
2001
IEEE
13 years 11 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
WWW
2009
ACM
14 years 8 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
14 years 1 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
WSE
2002
IEEE
14 years 15 days ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...