Sciweavers

624 search results - page 14 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
SIGSOFT
2010
ACM
14 years 7 months ago
Top ten ways to make formal methods for HPC practical
Almost all fundamental advances in science and engineering crucially depend on the availability of extremely capable high performance computing (HPC) systems. Future HPC systems w...
Ganesh Gopalakrishnan, Robert M. Kirby
RE
2001
Springer
15 years 1 months ago
Requirements for Evolving Systems: A Telecommunications Perspective
In many software application domains, constant evolution is the dominant problem, shaping both software design and the software process. Telecommunication software is the prototyp...
Pamela Zave
DAGSTUHL
2006
14 years 11 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens
SEW
2003
IEEE
15 years 2 months ago
Addressing Software Security and Mitigations in the Life Cycle
Traditionally, security is viewed as an organizational and Information Technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security...
David P. Gilliam, John D. Powell, Eric Haugh, Matt...