Sciweavers

1486 search results - page 119 / 298
» Firewall Rules Analysis
Sort
View
139
Voted
IANDC
2008
128views more  IANDC 2008»
15 years 4 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
IJDAR
2006
102views more  IJDAR 2006»
15 years 4 months ago
Table form document analysis based on the document structure grammar
Structure analysis of table form documents is an important issue because a printed document and even an electronic document do not provide logical structural information but merely...
Akira Amano, Naoki Asada, Masayuki Mukunoki, Masah...
IJON
2006
117views more  IJON 2006»
15 years 4 months ago
EEG classification using generative independent component analysis
We present an application of Independent Component Analysis (ICA) to the discrimination of mental tasks for EEG-based Brain Computer Interface systems. ICA is most commonly used w...
Silvia Chiappa, David Barber
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 10 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
135
Voted
COMCOM
2000
125views more  COMCOM 2000»
15 years 3 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi