Sciweavers

5180 search results - page 190 / 1036
» Requirements Engineering
Sort
View
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
15 years 9 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
RE
2001
Springer
15 years 8 months ago
Software Acquisition: A Business Strategy Analysis
This paper argues that there are new insights to be gained from a strategic analysis of requirements engineering. The paper is motivated by a simple question: what does it take to...
Barbara Farbey, Anthony Finkelstein
EUROSYS
2010
ACM
16 years 1 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverā€...
Vitaly Chipounov, George Candea
157
Voted
KBSE
2007
IEEE
15 years 10 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
KBSE
2005
IEEE
15 years 9 months ago
Automated test generation for engineering applications
In test generation based on model-checking, white-box test criteria are represented as trap conditions written in a temporal logic. A model checker is used to refute trap conditio...
Songtao Xia, Ben Di Vito, César Muño...