Sciweavers

50 search results - page 6 / 10
» Automated Generation and Analysis of Attack Graphs
Sort
View
80
Voted
CCS
2007
ACM
15 years 3 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
74
Voted
ICICS
2005
Springer
15 years 3 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
ERCIMDL
2004
Springer
180views Education» more  ERCIMDL 2004»
15 years 2 months ago
Next Generation Search Interfaces - Interactive Data Exploration and Hypothesis Formulation
To date, the majority of Web search engines have provided simple keyword search interfaces that present the results as a ranked list of hyperlinks. More recently researchers have b...
Jane Hunter, Katya Falkovych, Suzanne Little
67
Voted
DIAL
2006
IEEE
103views Image Analysis» more  DIAL 2006»
15 years 3 months ago
Multi-Queue Merging Scheme And Its Application in Arabic Script Segmentation
It is an important topic for segmentation on how to merge the over-segmented subimages of characters into integral characters. The conventional character segmentation has been mos...
Pingping Xiu, Liangrui Peng, Xiaoqing Ding
ICLP
2007
Springer
15 years 3 months ago
Static Region Analysis for Mercury
Abstract. Region-based memory management is a form of compiletime memory management, well-known from the functional programming world. This paper describes a static region analysis...
Quan Phan, Gerda Janssens