Sciweavers

31 search results - page 1 / 7
» ieeeares 2009
Sort
View
77
Voted
IEEEARES
2009
IEEE
15 years 9 months ago
Risk-Driven Architectural Decomposition
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
169
Voted
IEEEARES
2009
IEEE
15 years 9 months ago
Privacy-Preserving Collaborative Filtering Schemes
Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada
85
Voted
IEEEARES
2009
IEEE
15 years 9 months ago
Protecting Global and Static Variables from Buffer Overflow Attacks
Yves Younan, Frank Piessens, Wouter Joosen
64
Voted
IEEEARES
2009
IEEE
15 years 9 months ago
A First Step towards Characterizing Stealthy Botnets
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu
129
Voted
IEEEARES
2009
IEEE
14 years 12 months ago
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics
We present an automatic analyzer for measuring information flow within software systems. In this paper, we quantify leakage in terms of information theory and incorporate this comp...
Chunyan Mu, David Clark