Sciweavers

27 search results - page 6 / 6
» Towards Automation of Testing High-Level Security Properties
Sort
View
VIZSEC
2004
Springer
13 years 11 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
OOPSLA
2007
Springer
14 years 5 days ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden