Sciweavers

2740 search results - page 252 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
ISCC
2006
IEEE
147views Communications» more  ISCC 2006»
15 years 10 months ago
An Analytical Tool to Assess Readiness of Existing Networks for Deploying IP Telephony
Deploying IP telephony or voice over IP (VoIP) is a major and challenging task. This paper describes an analytical approach and tool to assess the readiness of existing IP network...
Khaled Salah, M. Almashari
UML
2005
Springer
15 years 9 months ago
Dynamic Secure Aspect Modeling with UML: From Models to Code
Abstract. Security engineering deals with modeling, analysis, and implementation of complex security mechanisms. The dynamic nature of such mechanisms makes it difficult to anticip...
Jan Jürjens, Siv Hilde Houmb
IS
2007
15 years 4 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
ACL
2009
15 years 1 months ago
Chinese Term Extraction Using Different Types of Relevance
This paper presents a new term extraction approach using relevance between term candidates calculated by a link analysis based method. Different types of relevance are used separa...
Yuhang Yang, Tiejun Zhao, Qin Lu, Dequan Zheng, Ha...
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 8 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...