Sciweavers

1548 search results - page 9 / 310
» Estimating Software Vulnerabilities
Sort
View
DATE
2009
IEEE
101views Hardware» more  DATE 2009»
15 years 4 months ago
Static analysis to mitigate soft errors in register files
—With continuous technology scaling, soft errors are becoming an increasingly important design concern even for earth-bound applications. While compiler approaches have the poten...
Jongeun Lee, Aviral Shrivastava
JTAER
2010
121views more  JTAER 2010»
14 years 7 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
ACNS
2009
Springer
170views Cryptology» more  ACNS 2009»
15 years 4 months ago
Fragility of the Robust Security Network: 802.11 Denial of Service
The upcoming 802.11w amendment to the 802.11 standard eliminates the 802.11 deauthentication and disassociation Denial of Service (DoS) vulnerabilities. This paper presents two oth...
Martin Eian
61
Voted
ISSRE
2005
IEEE
15 years 3 months ago
Modeling the Vulnerability Discovery Process
Omar H. Alhazmi, Yashwant K. Malaiya
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
15 years 2 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich