Sciweavers

21 search results - page 2 / 5
» Fang: A Firewall Analysis Engine
Sort
View
WOSP
2005
ACM
13 years 10 months ago
Modeling the performance of a NAT/firewall network service for the IXP2400
The evolution towards IP-aware access networks creates the possibility (and, indeed, the desirability) of additional network services, like firewalling or NAT, integrated into th...
Tom Verdickt, Wim Van de Meerssche, Koert Vlaeminc...
CSSE
2008
IEEE
13 years 11 months ago
Study on Application of CAD Sonification
—The feedback of sonification on CAD analyzing information in addition to picture interface increases user’s accepting information and decreases the load of visual channel. Dat...
Zhang Yinnan, Cen Gang, Fang Zhigang
DIMVA
2006
13 years 6 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...
KBSE
2009
IEEE
14 years 3 hour ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
SAC
2006
ACM
13 years 11 months ago
Spatial geometric constraint solving based on k-connected graph decomposition
We propose a geometric constraint solving method based on connectivity analysis in graph theory, which can be used to decompose a well-constrained problem into some smaller ones i...
Gui-Fang Zhang, Xiao-Shan Gao