Sciweavers

8177 search results - page 446 / 1636
» Detecting System Emulators
Sort
View
APSEC
2005
IEEE
15 years 6 months ago
Increasing the Efficiency of Fault Detection in Modified Code
Many software systems are developed in a number of consecutive releases. Each new release does not only add new code but also modifies already existing one. In this study we have ...
Piotr Tomaszewski, Lars Lundberg, Håkan Grah...
COLCOM
2008
IEEE
15 years 6 months ago
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites
Abstract. Malicious Web content poses a serious threat to the Internet, organizations and users. Current approaches to detecting malicious Web content employ high-powered honey cli...
Jiang Wang, Anup K. Ghosh, Yih Huang
DEON
2008
Springer
15 years 6 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
CIC
2006
148views Communications» more  CIC 2006»
15 years 5 months ago
RPC LSP Detection and Fuzzy Control Mechanisms in ATM Based MPLS on BcN
A major goal of the BcN (Broadband Convergence Network) is to facilitate convergence of networks and services. Many transport-related technologies were considered. One technology ...
Chulsoo Kim, Semyung Park, Taewan Kim, Jungtae Lee
GISCIENCE
2008
Springer
186views GIS» more  GISCIENCE 2008»
15 years 5 months ago
Detecting Topological Change Using a Wireless Sensor Network
Dynamic geographic phenomena, such as forest fires and oil spills, can have dire environmental, sociopolitical, and economic consequences. Mitigating, if not preventing such events...
Christopher Farah, Cheng Zhong, Michael F. Worboys...