Sciweavers

42 search results - page 2 / 9
» Windows of Vulnerability: A Case Study Analysis
Sort
View
VISSYM
2004
13 years 6 months ago
Case Study: Visualization of annotated DNA sequences
DNA sequences and their annotations form ever expanding data sets. Proper explorations of such data sets require new tools for visualization and analysis. In this case study, we h...
Tim H. J. M. Peeters, Huub van de Wetering, Mark W...
PRDC
1999
IEEE
13 years 9 months ago
Networked Windows NT System Field Failure Data Analysis
This paper presents a measurement-based dependability study of a Networked Windows NT system based on field data collected from NT System Logs from 503 servers running in a produc...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
DSN
2008
IEEE
13 years 6 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
TMA
2010
Springer
314views Management» more  TMA 2010»
13 years 11 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
ESEM
2010
ACM
13 years 3 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams