Sciweavers

410 search results - page 36 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
WISTP
2010
Springer
14 years 2 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...
FLAIRS
2009
13 years 5 months ago
Advanced Measures for Empirical Testing
Empirical testing is a very popular evaluation method for the development of intelligent systems. Here, previously solved problems with correct solutions are given as cases to the...
Joachim Baumeister
CSMR
2008
IEEE
14 years 2 months ago
Visual Detection of Design Anomalies
Design anomalies, introduced during software evolution, are frequent causes of low maintainability and low flexibility to future changes. Because of the required knowledge, an im...
Karim Dhambri, Houari A. Sahraoui, Pierre Poulin
OOPSLA
2005
Springer
14 years 1 months ago
Using predicate fields in a highly flexible industrial control system
Predicate fields allow an object’s structure to vary at runtime based on the object’s state: a predicate field is present or not, depending on the values of other fields. P...
Shay Artzi, Michael D. Ernst
ICDCSW
2007
IEEE
14 years 2 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...