Sciweavers

185 search results - page 22 / 37
» A Metrics Framework to Drive Application Security Improvemen...
Sort
View
ATAL
2004
Springer
15 years 2 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
CONEXT
2009
ACM
14 years 10 months ago
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. T...
Marios Iliofotou, Michalis Faloutsos, Michael Mitz...
62
Voted
CODES
2005
IEEE
15 years 3 months ago
Comparing the size of .NET applications with native code
Byte-code based languages are slowly becoming adopted in embedded domains because of improved security and portability. Another potential reason for their adoption is the reputati...
Roberto Costa, Erven Rohou
TCSV
2010
14 years 4 months ago
Object Tracking in Structured Environments for Video Surveillance Applications
Abstract--We present a novel tracking method for effectively tracking objects in structured environments. The tracking method finds applications in security surveillance, traffic m...
Junda Zhu, Yuanwei Lao, Yuan F. Zheng
ISSRE
2010
IEEE
14 years 8 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...