Sciweavers

5241 search results - page 681 / 1049
» Embedded Programming with C
Sort
View
RAID
2001
Springer
15 years 8 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
DSN
2000
IEEE
15 years 8 months ago
An Automatic SPIN Validation of a Safety Critical Railway Control System
This paper describes an experiment in formal specification and validation performed in the context of an industrial joint project. The project involved an Italian company working...
Stefania Gnesi, Diego Latella, Gabriele Lenzini, C...
DSN
2000
IEEE
15 years 8 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
ISSRE
2000
IEEE
15 years 8 months ago
Software Black Box: An Alternative Mechanism for Failure Analysis
Learning from software failures is an essential step towards the development of more reliable software systems and processes. However, as more intricate software systems are devel...
Sebastian G. Elbaum, John C. Munson
VLSID
1999
IEEE
139views VLSI» more  VLSID 1999»
15 years 8 months ago
Processor Modeling for Hardware Software Codesign
In hardware - software codesign paradigm often a performance estimation of the system is needed for hardware - software partitioning. The tremendous growth of application specific...
V. Rajesh, Rajat Moona