Sciweavers

13913 search results - page 2714 / 2783
» models 2007
Sort
View
ITNG
2008
IEEE
14 years 4 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
3DIM
2007
IEEE
14 years 4 months ago
Light stripe triangulation for multiple of moving rigid objects
In this paper, we propose an extension of light stripe triangulation for multiple of moving rigid objects. With traditional light stripe triangulation, the acquired shape of movin...
Takuya Funatomi, Masaaki Iiyama, Koh Kakusho, Mich...
3DIM
2007
IEEE
14 years 4 months ago
3D laser measurement system for large scale architectures using multiple mobile robots
In order to construct three dimensional shape models of large scale architectures by a laser range finder, a number of range images are normally taken from various viewpoints and...
Ryo Kurazume, Yukihiro Tobata, Yumi Iwashita, Tsut...
ACSAC
2007
IEEE
14 years 4 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
ACSAC
2007
IEEE
14 years 4 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
« Prev « First page 2714 / 2783 Last » Next »