Sciweavers

410 search results - page 24 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
SIGCOMM
2004
ACM
14 years 1 months ago
SPV: secure path vector routing for securing BGP
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of the underlying border gateway routing protocol (BGP) stands out as the Achilles h...
Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
JALC
2006
125views more  JALC 2006»
13 years 7 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
ISMIR
2005
Springer
135views Music» more  ISMIR 2005»
14 years 1 months ago
Automatic X Traditional Descriptor Extraction: the Case of Chord Recognition
Audio descriptor extraction is the activity of finding mathematical models which describe properties of the sound, requiring signal processing skills. The scientific literature pr...
Giordano Ribeiro de Eulalio Cabral, Françoi...
KBS
2011
116views more  KBS 2011»
13 years 2 months ago
Advanced empirical testing
In today’s industrial applications, we see that knowledge systems are successfully implemented. However, critical domains require the elaborate and thoughtful validation of the ...
Joachim Baumeister
CBSE
2011
Springer
12 years 7 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...