Sciweavers

18 search results - page 3 / 4
» Automated and Safe Vulnerability Assessment
Sort
View
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
13 years 11 months ago
Toward More Robust Infrastructure: Observations on Improving the Resilience and Reliability of Critical Systems
Civil infrastructure provides the range of essential services generally necessary to support a nation’s economy and quality of life—arguably entire economies rely on the abili...
Richard G. Little
HICSS
2008
IEEE
115views Biometrics» more  HICSS 2008»
14 years 23 days ago
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...
JOT
2010
108views more  JOT 2010»
13 years 4 months ago
Dynamic adaptability with .NET service components
In self-adaptive systems components are dynamically modified according to the execution environment requirement, where each component is a probable point of failure. Existing appr...
Arun Mishra, A. K. Misra
DAC
2005
ACM
14 years 7 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 1 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...