Sciweavers

42 search results - page 3 / 9
» Windows of Vulnerability: A Case Study Analysis
Sort
View
CODES
2006
IEEE
13 years 11 months ago
Creation and utilization of a virtual platform for embedded software optimization: : an industrial case study
Virtual platform (ViP), or ESL (Electronic System Level) simulation model, is one of the most widely renowned system level design techniques. In this paper, we present a case stud...
Sungpack Hong, Sungjoo Yoo, Sheayun Lee, Sangwoo L...
TRIDENTCOM
2006
IEEE
13 years 11 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
VIP
2001
13 years 7 months ago
Layered Earth Inversion Visual Toolkit: A Scientific Visualisation Case Study
Visualisation Systems are in general designed to maximise the cognitive ability of system users particularly when exposed to large sets of otherwise difficult to comprehend data, ...
Andrew Donohoo, Debbie Richards
ISSTA
2010
ACM
13 years 9 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
ICCSA
2005
Springer
13 years 11 months ago
Security Risk Vector for Quantitative Asset Assessment
There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...