Sciweavers

42 search results - page 5 / 9
» Windows of Vulnerability: A Case Study Analysis
Sort
View
JTAER
2010
121views more  JTAER 2010»
13 years 8 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
BMCBI
2010
166views more  BMCBI 2010»
13 years 10 months ago
Accurate peak list extraction from proteomic mass spectra for identification and profiling studies
Background: Mass spectrometry is an essential technique in proteomics both to identify the proteins of a biological sample and to compare proteomic profiles of different samples. ...
Nicola Barbarini, Paolo Magni
INFSOF
2007
83views more  INFSOF 2007»
13 years 9 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
14 years 4 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...