Sciweavers

624 search results - page 59 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
CORR
2010
Springer
176views Education» more  CORR 2010»
14 years 12 months ago
Network Traffic Anomalies Detection and Identification with Flow Monitoring
Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. R...
Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokj...
OOPSLA
2004
Springer
15 years 5 months ago
Finding bugs is easy
Many techniques have been developed over the years to automatically find bugs in software. Often, these techniques rely on formal methods and sophisticated program analysis. Whil...
David Hovemeyer, William Pugh
CODES
2007
IEEE
15 years 6 months ago
Dynamic security domain scaling on symmetric multiprocessors for future high-end embedded systems
We propose a method for dynamic security domain scaling on SMPs that offers both highly scalable performance and high security for future high-end embedded systems. Its most impor...
Hiroaki Inoue, Akihisa Ikeno, Tsuyoshi Abe, Junji ...
FM
2005
Springer
88views Formal Methods» more  FM 2005»
15 years 5 months ago
Timing Tolerances in Safety-Critical Software
Many safety-critical software applications are hard real-time systems. They have stringent timing requirements that have to be met. We present a description of timing behaviour tha...
Alan Wassyng, Mark Lawford, Xiayong Hu
TAP
2009
Springer
125views Hardware» more  TAP 2009»
15 years 6 months ago
Development of a Generic Voter under FoCal
Safety and security are claimed major concerns by the formal FoCaL development environment. In [7] we introduced a safety development cycle customised to FoCaL. In this paper, we e...
Philippe Ayrault, Thérèse Hardin, Fr...