Sciweavers

761 search results - page 112 / 153
» Effectiveness Improvement of ECR Tests
Sort
View
MINENET
2006
ACM
15 years 3 months ago
Privacy-preserving performance measurements
Internet performance is an issue of great interest, but it is not trivial to measure. A number of commercial companies try to measure this, as does RIPE, and many individual Inter...
Matthew Roughan, Yin Zhang
ACSAC
2005
IEEE
15 years 3 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
ACSAC
2005
IEEE
15 years 3 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
EUROMICRO
2005
IEEE
15 years 3 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
IAT
2005
IEEE
15 years 3 months ago
Decomposing Large-Scale POMDP Via Belief State Analysis
Partially observable Markov decision process (POMDP) is commonly used to model a stochastic environment with unobservable states for supporting optimal decision making. Computing ...
Xin Li, William K. Cheung, Jiming Liu