Sciweavers

3516 search results - page 164 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
149
Voted
CODASPY
2012
13 years 11 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
142
Voted
MEDIAFORENSICS
2010
15 years 4 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
ICSE
2010
IEEE-ACM
15 years 1 months ago
Integrating legacy systems with MDE
Integrating several legacy software systems together is commonly performed with multiple applications of the Adapter Design Pattern in oo languages such as Java. The integration i...
Mickael Clavreul, Olivier Barais, Jean-Marc J&eacu...
ICRA
2006
IEEE
158views Robotics» more  ICRA 2006»
15 years 9 months ago
An Agent-based Mobile Robot System using Configurable SOC Technique
– To make a mobile robot with real-time vision system adapt to the highly dynamic environments and emergencies under the real-time constraints, a significant account of processin...
Yan Meng
KBSE
2005
IEEE
15 years 9 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard