Sciweavers

2132 search results - page 105 / 427
» Automated software winnowing
Sort
View
WISEC
2010
ACM
15 years 6 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
CCS
2007
ACM
15 years 5 months ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks
DAWAK
2007
Springer
15 years 5 months ago
Automating the Schema Matching Process for Heterogeneous Data Warehouses
Abstract. A federated data warehouse is a logical integration of data warehouses applicable when physical integration is impossible due to privacy policy or legal restrictions. In ...
Marko Banek, Boris Vrdoljak, A. Min Tjoa, Zoran Sk...
ICECCS
2005
IEEE
171views Hardware» more  ICECCS 2005»
15 years 4 months ago
Behavior Capture and Test: Automated Analysis of Component Integration
Component-based technology is increasingly adopted to speed up the development of complex software through component reuse. Unfortunately, the lack of complete information about r...
Leonardo Mariani, Mauro Pezzè
JCDL
2005
ACM
175views Education» more  JCDL 2005»
15 years 4 months ago
Automated text classification using a multi-agent framework
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
Yueyu Fu, Weimao Ke, Javed Mostafa