Sciweavers

817 search results - page 98 / 164
» Malware behaviour analysis
Sort
View
ASWEC
2006
IEEE
15 years 6 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
ELPUB
2006
ACM
15 years 5 months ago
The Practices and Popularity of British Bloggers
A snapshot of the British blogosphere focusing on the blogging habits and technical abilities of a sample of British bloggers. Most of the academic research that has so far been p...
Sarah Pedersen, Caroline Macafee
CIBCB
2005
IEEE
15 years 5 months ago
Network Motifs, Feedback Loops and the Dynamics of Genetic Regulatory Networks
We analyse a suite of Boolean networks which have been evolved to exhibit limit cycle-type dynamics in terms of the distribution of small network motifs and feedback loops. We find...
Jennifer Hallinan, Paul T. Jackway
EEE
2005
IEEE
15 years 5 months ago
Web System Trace Model Using a Web Application Architecture Framework
Traceability analysis is crucial to the development of web-centric systems, particularly those with frequent system changes, fine-grained evolution and maintenance, and high level...
Xiaoying Kong, Li Liu, David Lowe
FM
2005
Springer
88views Formal Methods» more  FM 2005»
15 years 5 months ago
Timing Tolerances in Safety-Critical Software
Many safety-critical software applications are hard real-time systems. They have stringent timing requirements that have to be met. We present a description of timing behaviour tha...
Alan Wassyng, Mark Lawford, Xiayong Hu