Sciweavers

341 search results - page 50 / 69
» A Security Engineering Process based on Patterns
Sort
View
ENTCS
2010
97views more  ENTCS 2010»
14 years 9 months ago
A Framework for Modelling and Simulating Networks of Cells
Several complex biological phenomena are to be modelled in terms of a large and dynamic network of compartments, where the interplay between inter-compartment and intra-compartmen...
Sara Montagna, Mirko Viroli
SADM
2011
14 years 6 months ago
Trellis display for modeling data from designed experiments
Abstract: Visualizing data by graphing a response against certain factors, and conditioning on other factors, has arisen independently in many contexts. One is the interaction plot...
Montserrat Fuentes, Bowei Xi, William S. Cleveland
CCS
2003
ACM
15 years 5 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
ERSA
2006
197views Hardware» more  ERSA 2006»
15 years 1 months ago
A High Speed, Run Time Reconfigurable Image Acquisition processor for a Missile Approach Warning System
High frame rate video capture and image processing is an important capability for applications in defense and homeland security where incoming missiles must be detected in very sh...
Vinay Sriram, David Kearney
SAFECOMP
1999
Springer
15 years 4 months ago
A Systematic Approach to Safety Case Maintenance
A crucial aspect of safety case management is the ongoing maintenance of the safety argument through life. Throughout the operational life of any system, the corresponding safety ...
Tim P. Kelly, John A. McDermid