Sciweavers

269 search results - page 46 / 54
» Using model-based security analysis in component-oriented sy...
Sort
View
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 25 days ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
SIAMSC
2008
126views more  SIAMSC 2008»
13 years 7 months ago
Towards a Statistical Theory of Texture Evolution in Polycrystals
Abstract. Most technologically useful materials possess polycrystalline microstructures composed of a large number of small monocrystalline grains separated by grain boundaries. Th...
K. Barmak, M. Emelianenko, Dmitry Golovaty, David ...
MOBISYS
2010
ACM
13 years 10 months ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
FOSSACS
2005
Springer
14 years 1 months ago
Model Checking for Nominal Calculi
Nominal calculi have been shown very effective to formally model a variety of computational phenomena. The models of nominal calculi have often infinite states, thus making model ...
Gian Luigi Ferrari, Ugo Montanari, Emilio Tuosto