Sciweavers

441 search results - page 9 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
ESSOS
2009
Springer
14 years 4 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
INFOCOM
2007
IEEE
14 years 4 months ago
Measuring Network-Aware Worm Spreading Ability
— This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent worms that exploit such a vuln...
Zesheng Chen, Chuanyi Ji
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
14 years 4 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
HICSS
2008
IEEE
135views Biometrics» more  HICSS 2008»
14 years 4 months ago
The Emerging Role of Vertical Search Engines in Travel Distribution: A Newly-Vulnerable Electronic Markets Perspective
Information technology (IT) advances often create turmoil and disturb existing industry structures. We analyze the impact of the Internet and e-commerce technologies on digital int...
Nelson F. Granados, Robert J. Kauffman, Bradley Ki...