Sciweavers

16 search results - page 3 / 4
» How to Steal a Botnet and What Can Happen When You Do
Sort
View
ELPUB
2006
ACM
13 years 11 months ago
CityInMyPocket: Digital Walking Guides
By the end of this year visitors to the Flemish town of Mechelen can discover the city with the help of the new CityInMyPocket walking guide. Instead of following a person or a bo...
Steven Depuydt, Jeroen Vanattenhoven, Jan Engelen
NORDSEC
2009
Springer
14 years 10 days ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
QEST
2010
IEEE
13 years 3 months ago
Timed Branching Processes
We study Timed Branching Processes (TBPs), a natural extension of (multitype) Branching Processes (BPs) where each entity is equipped with a finite set of private continuous variab...
Ashutosh Trivedi, Dominik Wojtczak
SIGUCCS
2009
ACM
14 years 9 days ago
The many benefits of cultivating a community among IT staff
Conference Abstracts October 11-14, 2009 t provides the abstracts and the author(s)’ name(s) for the technical program. The actual presenter(s) may vary. Updated September 20, 20...
Ken Layng
MTDT
2003
IEEE
164views Hardware» more  MTDT 2003»
13 years 11 months ago
Applying Defect-Based Test to Embedded Memories in a COT Model
ct Defect-based testing for digital logic concentrates primarily on methods of test application, including for example at-speed structural tests and IDDQ testing. In contrast, defe...
Robert C. Aitken