Sciweavers

1548 search results - page 34 / 310
» Estimating Software Vulnerabilities
Sort
View
72
Voted
ACSAC
2002
IEEE
15 years 2 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
93
Voted
CCS
2008
ACM
14 years 11 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
ETT
2000
70views Education» more  ETT 2000»
14 years 9 months ago
SS-MC-MA Systems with Pilot Symbol Aided Channel Estimation in the Asynchronous Uplink
Spread spectrum multi-carrier multiple access (SS-MC-MA) systems exploit in a similar manner as MC-CDMA systems the advantages of the diversity gain due to the spread spectrum tech...
Stefan Kaiser, Witold A. Krzymien, Khaled Fazel
DATE
2010
IEEE
157views Hardware» more  DATE 2010»
15 years 2 months ago
RMOT: Recursion in model order for task execution time estimation in a software pipeline
Abstract—This paper addresses the problem of execution time estimation for tasks in a software pipeline independent of the application structure or the underlying architecture. A...
Nabeel Iqbal, M. A. Siddique, Jörg Henkel
ISESE
2003
IEEE
15 years 2 months ago
A Review of Surveys on Software Effort Estimation
This paper summarizes estimation knowledge through a review of surveys on software effort estimation. Main findings were that: (1) Most projects (60-80%) encounter effort and/or s...
Kjetil Moløkken, Magne Jørgensen