Sciweavers

45 search results - page 6 / 9
» Penetration Testing: A Duet
Sort
View
IPSN
2007
Springer
15 years 8 months ago
An empirical study of collaborative acoustic source localization
— Field biologists use animal sounds to discover the presence of individuals and to study their behavior. Collecting bio-acoustic data has traditionally been a difficult and tim...
Andreas M. Ali, Kung Yao, Travis C. Collier, Charl...
153
Voted
ACSAC
2007
IEEE
15 years 8 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
91
Voted
ICRA
2010
IEEE
130views Robotics» more  ICRA 2010»
15 years 11 days ago
All-weather perception for man-portable robots using ultra-wideband radar
—Autonomous man-portable robots have the potential to provide a wide range of new capabilities for both military and civilian applications. Previous research in autonomy for smal...
Brian Yamauchi
ICSM
2002
IEEE
15 years 6 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
134
Voted
TCS
2002
15 years 1 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer