Sciweavers

294 search results - page 42 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
DSOM
2003
Springer
15 years 5 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
104
Voted
GD
2008
Springer
15 years 24 days ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
ACSC
2006
IEEE
15 years 5 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
CLUSTER
2002
IEEE
14 years 11 months ago
ZENTURIO: An Experiment Management System for Cluster and Grid Computing
The need to conduct and manage large sets of experiments for scientific applications dramatically increased over the last decade. However, there is still very little tool support ...
Radu Prodan, Thomas Fahringer
AVSS
2008
IEEE
15 years 6 months ago
Automatic Detection of Adverse Weather Conditions in Traffic Scenes
Visual surveillance in outdoor environments requires the monitoring of both objects and events. The analysis is generally driven by the target application which, in turn, determin...
Andrea Lagorio, Enrico Grosso, Massimo Tistarelli