Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
During the last decade, the synchronous approach has proved to meet industrial needs concerning the development of Distributed Control Systems (DCS): as an example, Schneider Elect...
Paul Caspi, Christine Mazuet, Rym Salem, Daniel We...
Class libraries are generally designed with an emphasis on versatility and extensibility. Applications that use a library typically exercise only part of the library’s functiona...
This paper describes a new approach to visualizing program systems within the object-oriented paradigm. This approach is based on a TEX-like notation which has been extended and g...
In recent years it has been shown that dynamic monitoring can be used to soundly enforce information flow policies. For programs distributed in source or bytecode form, the use o...