Sciweavers

CCS
2015
ACM
9 years 11 months ago
Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy
Firewall configuration is a critical activity for the Supervisory Control and Data Acquisition (SCADA) networks that control power stations, water distribution, factory automatio...
Dinesha Ranathunga, Matthew Roughan, Phil Kernick,...
CCS
2015
ACM
9 years 11 months ago
Subversion-Resilient Signature Schemes
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Our model of subversion generalizes previous work in several directions, and is i...
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
SCAM
2015
IEEE
9 years 11 months ago
SimNav: Simulink navigation of model clone classes
—SimNav is a GUI designed for displaying and navigating clone classes of Simulink models detected by the model clone detector Simone. As an embedded Simulink interface tool, SimN...
Eric J. Rapos, Andrew Stevenson, Manar H. Alalfi, ...
SCAM
2015
IEEE
9 years 11 months ago
Discovering likely mappings between APIs using text mining
Rahul Pandita, Raoul Praful Jetley, Sithu D. Sudar...
SCAM
2015
IEEE
9 years 11 months ago
The use of C++ exception handling constructs: A comprehensive study
Abstract—Exception handling (EH) is a well-known mechanism that aims at improving software reliability in a modular way—allowing a better separation between the code that deals...
Rodrigo Bonifácio, Fausto Carvalho, Guilher...