Sciweavers

45 search results - page 6 / 9
» Penetration Testing: A Duet
Sort
View
IPSN
2007
Springer
15 years 6 months ago
An empirical study of collaborative acoustic source localization
— Field biologists use animal sounds to discover the presence of individuals and to study their behavior. Collecting bio-acoustic data has traditionally been a difficult and tim...
Andreas M. Ali, Kung Yao, Travis C. Collier, Charl...
ACSAC
2007
IEEE
15 years 6 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
ICRA
2010
IEEE
130views Robotics» more  ICRA 2010»
14 years 10 months ago
All-weather perception for man-portable robots using ultra-wideband radar
—Autonomous man-portable robots have the potential to provide a wide range of new capabilities for both military and civilian applications. Previous research in autonomy for smal...
Brian Yamauchi
ICSM
2002
IEEE
15 years 4 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
TCS
2002
14 years 11 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer