Sciweavers

Share
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
9 years 2 days ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
9 years 2 days ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
9 years 2 days ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
ECBS
2007
IEEE
145views Hardware» more  ECBS 2007»
9 years 2 months ago
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams
We present in this paper a new approach for the automatic verification and performance analysis of SysML activity diagrams. Since timeliness is important in the design and analysi...
Yosr Jarraya, Andrei Soeanu, Mourad Debbabi, Fawzi...
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
9 years 2 months ago
Evaluating the Quality of Models Extracted from Embedded Real-Time Software
Due to the high cost of modeling, model-based techniques are yet to make their impact in the embedded systems industry, which still persist on maintaining code-oriented legacy sys...
Joel Huselius, Johan Kraft, Hans Hansson, Sasikuma...
ECBS
2007
IEEE
97views Hardware» more  ECBS 2007»
9 years 4 months ago
A Service-Oriented Extension of the V-Modell XT
The ever growing size and complexity of both technical and business systems requires efficient software engineering approaches to keep development cost under control while still ...
Michael Meisinger, Ingolf Krüger
ECBS
2007
IEEE
122views Hardware» more  ECBS 2007»
9 years 4 months ago
Time- and Space-Efficient Evaluation of Sparse Boolean Functions in Embedded Software
The paper addresses software implementation of large sparse systems of Boolean functions. Fast evaluation of such functions with the smallest memory consumption is often required ...
Vaclav Dvorak
ECBS
2007
IEEE
135views Hardware» more  ECBS 2007»
9 years 4 months ago
COTS Selection: Past, Present, and Future
Commercial Off-The-Shelf (COTS) products are increasingly being used in software development. In COTS-based development, selecting appropriate COTS is the most crucial phase. This...
Abdallah Mohamed, Günther Ruhe, Armin Eberlei...
ECBS
2007
IEEE
115views Hardware» more  ECBS 2007»
9 years 4 months ago
Modeling the Functionality of Multi-Functional Software Systems
Today, many software-based, reactive systems offer a multitude of functionality. One way to master the development of such a system is to model its functionality on an abstract le...
Alexander Gruler, Alexander Harhurin, Judith Hartm...
ECBS
2007
IEEE
135views Hardware» more  ECBS 2007»
9 years 4 months ago
Introducing Impact Analysis for Architectural Decisions
Architectural quality constitutes a critical factor for contemporary software systems, especially because of their size and the needs for frequent, quick changes. For success-crit...
Matthias Riebisch, Sven Wohlfarth
books