Sciweavers

144 search results - page 2 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
ESORICS
2009
Springer
14 years 5 months ago
Model-Checking DoS Amplification for VoIP Session Initiation
Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather ...
Carl A. Gunter, José Meseguer, Musab AlTurk...
MTV
2005
IEEE
100views Hardware» more  MTV 2005»
13 years 11 months ago
A Study of Architecture Description Languages from a Model-based Perspective
Abstract— Owing to the recent trend of using applicationspecific instruction-set processors (ASIP), many Architecture Description Languages (ADLs) have been created. They specif...
Wei Qin, Sharad Malik
BPSC
2010
166views Business» more  BPSC 2010»
13 years 4 months ago
Case Study on Extending Internet of Services Techniques to Real-World Services
: The Internet of Services promotes distributable, composable and tradeable services as first-class entities. Such services are assumed to encompass the full range from electronic...
Josef Spillner, Ronny Kursawe, Alexander Schill
ICASSP
2011
IEEE
12 years 9 months ago
Bayesian topic models for describing computer network behaviors
We consider the use of Bayesian topic models in the analysis of computer network traffic. Our approach utilizes latent Dirichlet allocation and time-varying dynamic latent Dirich...
Christopher Cramer, Lawrence Carin
CHI
2001
ACM
14 years 5 months ago
Layered participatory analysis: new developments in the CARD technique
CARD (Collaborative Analysis of Requirements and Design) is an influential technique for participatory design and participatory analysis that is in use on three continents. This p...
Michael J. Muller