Sciweavers

2560 search results - page 423 / 512
» Analysis Tool for Honeypot Systems
Sort
View
JTRES
2009
ACM
15 years 8 months ago
On transforming Java-like programs into memory-predictable code
The ScopedMemory class of the RTSJ enables the organization of objects into regions. This ensures time-predictable management of dynamic memory. Using scopes forces the programmer...
Diego Garbervetsky, Sergio Yovine, Víctor A...
ISSRE
2008
IEEE
15 years 8 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
105
Voted
WCRE
2008
IEEE
15 years 8 months ago
Retrieving Task-Related Clusters from Change History
During software maintenance tasks, developers often spend an important amount of effort investigating source code. This effort can be reduced if tools are available to help develo...
Martin P. Robillard, Barthélémy Dage...
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
15 years 8 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
15 years 8 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....