Sciweavers

410 search results - page 48 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 7 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
SICHERHEIT
2010
13 years 5 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...
KBSE
2008
IEEE
14 years 2 months ago
Becoming responsive to service usage and performance changes by applying service feedback metrics to software maintenance
Software vendors are unaware of how their software performs in the field. They do not know what parts of their software are used and appreciated most and have little knowledge ab...
Henk van der Schuur, Slinger Jansen, Sjaak Brinkke...
SAC
2008
ACM
13 years 7 months ago
A reusable object-oriented design to support self-testable autonomic software
As the enabling technologies of autonomic computing continue to advance, it is imperative for researchers to exchange the details of their proposed techniques for designing, devel...
Tariq M. King, Alain E. Ramirez, Peter J. Clarke, ...
CCS
2011
ACM
12 years 7 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...