Sciweavers

733 search results - page 131 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
DSN
2005
IEEE
15 years 5 months ago
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
Since sensor data gathering is the primary functionality of sensor networks, it is important to provide a fault tolerant method for reasoning about sensed events in the face of ar...
Mark D. Krasniewski, Padma Varadharajan, Bryan Rab...
POPL
2011
ACM
14 years 2 months ago
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol
We consider programs for embedded real-time systems which use priority-driven preemptive scheduling with task priorities adjusted dynamically according to the immediate ceiling pr...
Martin D. Schwarz, Helmut Seidl, Vesal Vojdani, Pe...
ACSAC
2007
IEEE
15 years 6 months ago
Toward Realistic and Artifact-Free Insider-Threat Data
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For reasons of privacy and confidentiality, no one wants to...
Kevin S. Killourhy, Roy A. Maxion
AEI
2010
136views more  AEI 2010»
14 years 12 months ago
Bridging the sense-reasoning gap: DyKnow - Stream-based middleware for knowledge processing
nizing multiple forms of information and knowledge processing on different levels of abstraction in a structured and principled manner. We propose knowledge processing middleware a...
Fredrik Heintz, Jonas Kvarnström, Patrick Doh...
91
Voted
ENTCS
2007
118views more  ENTCS 2007»
14 years 11 months ago
Safe Adaptation of Component Coordination
In the domain of software engineering, the use of software components is now a well established approach. However, it raises problems about the dynamic adaptation of these compone...
Christophe Sibertin-Blanc, Philippe Mauran, G&eacu...