Sciweavers

1353 search results - page 67 / 271
» Securing Current and Future Process Control Systems
Sort
View
IEEEHPCS
2010
15 years 1 months ago
Scalable instruction set simulator for thousand-core architectures running on GPGPUs
Simulators are still the primary tools for development and performance evaluation of applications running on massively parallel architectures. However, current virtual platforms a...
Shivani Raghav, Martino Ruggiero, David Atienza, C...
ARESEC
2011
119views more  ARESEC 2011»
14 years 3 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob
ICSM
2002
IEEE
15 years 8 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
DEXA
2005
Springer
176views Database» more  DEXA 2005»
15 years 8 months ago
Control-Based Quality Adaptation in Data Stream Management Systems
Unlike processing snapshot queries in a traditional DBMS, the processing of continuous queries in a data stream management system (DSMS) needs to satisfy quality requirements such ...
Yi-Cheng Tu, Mohamed Hefeeda, Yuni Xia, Sunil Prab...
ISW
2007
Springer
15 years 9 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...