Sciweavers

2623 search results - page 78 / 525
» tools 2010
Sort
View
AMAST
2010
Springer
13 years 5 months ago
Integrating Maude into Hets
Maude modules can be understood as models that can be formally analyzed and verified with respect to different properties expressing various formal requirements. However, Maude lac...
Mihai Codescu, Till Mossakowski, Adrián Rie...
SIGOPS
2010
89views more  SIGOPS 2010»
13 years 8 months ago
Incremental learning of system log formats
System logs come in a large and evolving variety of formats, many of which are semi-structured and/or non-standard. As a consequence, off-the-shelf tools for processing such logs ...
Kenny Qili Zhu, Kathleen Fisher, David Walker
IFIP
2010
Springer
13 years 4 months ago
Foundations of Attack-Defense Trees
We introduce and give formal definitions of attack
Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Patr...
DIMVA
2010
13 years 11 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
STTT
2010
115views more  STTT 2010»
13 years 8 months ago
Scalable shared memory LTL model checking
Recent development in computer hardware has brought more wide-spread emergence of shared memory, multi-core systems. These architectures offer opportunities to speed up various ta...
Jiri Barnat, Lubos Brim, Petr Rockai