Sciweavers

3516 search results - page 408 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
IWIA
2005
IEEE
15 years 10 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
EMSOFT
2008
Springer
15 years 6 months ago
Symbolic analysis for improving simulation coverage of Simulink/Stateflow models
Aimed at verifying safety properties and improving simulation coverage for hybrid systems models of embedded control software, we propose a technique that combines numerical simul...
Rajeev Alur, Aditya Kanade, S. Ramesh, K. C. Shash...
SIGGRAPH
1991
ACM
15 years 8 months ago
Design and simulation of opera lighting and projection effects
A major problem challenging opera designers is the inability to coordinate lighting, projection systems, and set designs in the preliminary planning phase. New computer graphics t...
Julie Dorsey, François X. Sillion, Donald P...
AMAST
2000
Springer
15 years 9 months ago
A New Logic for Electronic Commerce Protocols
The primary objective of this paper is to present the deÿnition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It a...
Kamel Adi, Mourad Debbabi, Mohamed Mejri
AOSE
2003
Springer
15 years 10 months ago
A Framework for Constructing Multi-agent Applications and Training Intelligent Agents
As agent-oriented paradigm is reaching a significant level of acceptance by software developers, there is a lack of integrated highstraction tools for the design and development o...
Pericles A. Mitkas, Dionisis Kehagias, Andreas L. ...