Sciweavers

269 search results - page 40 / 54
» Using model-based security analysis in component-oriented sy...
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 7 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
PASTE
2010
ACM
13 years 9 months ago
Null dereference analysis in practice
Many analysis techniques have been proposed to determine when a potentially null value may be dereferenced. But we have observed in practice that not every potential null derefere...
Nathaniel Ayewah, William Pugh
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
HYBRID
2007
Springer
14 years 1 months ago
Model Checking Genetic Regulatory Networks with Parameter Uncertainty
The lack of precise numerical information for the values of biological parameters severely limits the development and analysis of models of genetic regulatory networks. To deal wit...
Grégory Batt, Calin Belta, Ron Weiss
HICSS
2003
IEEE
117views Biometrics» more  HICSS 2003»
14 years 26 days ago
Performance of Integrated Supply Chains - An International Case Study in High Tech Manufacturing
The aim of this study is to identify factors that improve the performance of integrated supply chains (SCs). We developed the ‘extended strategic alignment model’ based on the ...
David C. L. Kuo, Martin Smits