Sciweavers

2236 search results - page 228 / 448
» Secure Software Design in Practice
Sort
View
131
Voted
KDD
2004
ACM
190views Data Mining» more  KDD 2004»
16 years 3 months ago
V-Miner: using enhanced parallel coordinates to mine product design and test data
Analyzing data to find trends, correlations, and stable patterns is an important task in many industrial applications. This paper proposes a new technique based on parallel coordi...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Sc...
EDOC
2006
IEEE
15 years 9 months ago
Model Driven Design of Distribution Patterns for Web Service Compositions
Increasingly, distributed systems are being constructed by composing a number of discrete components. This practice, termed composition, is particularly prevalent within the Web s...
Ronan Barrett, Claus Pahl
IWIA
2005
IEEE
15 years 9 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
144
Voted
IJWIS
2007
153views more  IJWIS 2007»
15 years 3 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
ICDCS
2010
IEEE
15 years 7 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...