Sciweavers

1627 search results - page 285 / 326
» High Security Smartcards
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 1 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
PODS
2005
ACM
136views Database» more  PODS 2005»
16 years 27 days ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
107
Voted
ICSE
2003
IEEE-ACM
16 years 26 days ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer
123
Voted
ICCD
2002
IEEE
257views Hardware» more  ICCD 2002»
15 years 9 months ago
Requirements for Automotive System Engineering Tools
The requirements to system and software development tools brought up by the automotive industry differ from the requirements that other customers have. The important catchwords he...
Joachim Schlosser
119
Voted
SOSP
2003
ACM
15 years 9 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...