Sciweavers

2071 search results - page 222 / 415
» An Empirical Evaluation of LFG-DOP
Sort
View
ICSE
2007
IEEE-ACM
16 years 1 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
ICCD
2004
IEEE
115views Hardware» more  ICCD 2004»
15 years 10 months ago
Generating Monitor Circuits for Simulation-Friendly GSTE Assertion Graphs
Formal and dynamic (simulation, emulation, etc.) verification techniques are both needed to deal with the overall challenge of verification. Ideally, the same specification/tes...
Kelvin Ng, Alan J. Hu, Jin Yang
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 8 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
TMA
2010
Springer
487views Management» more  TMA 2010»
15 years 8 months ago
End-to-End Available Bandwidth Estimation Tools, An Experimental Comparison
Abstract. The available bandwidth of a network path impacts the performance of many applications, such as VoIP calls, video streaming and P2P content distribution systems. Several ...
Emanuele Goldoni, Marco Schivi
CCS
2009
ACM
15 years 8 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...