Sciweavers

1587 search results - page 38 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
15 years 3 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
VIZSEC
2004
Springer
15 years 3 months ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
SSS
2009
Springer
163views Control Systems» more  SSS 2009»
15 years 4 months ago
Developing Autonomic and Secure Virtual Organisations with Chemical Programming
This paper studies the development of autonomic and secure Virtual Organisations (VOs) when following the chemical-programming paradigm. We have selected the Higher-Order Chemical ...
Alvaro E. Arenas, Jean-Pierre Banâtre, Thier...
DASC
2006
IEEE
15 years 1 months ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
PST
2004
14 years 11 months ago
A Diagrammatical Framework for Information Systems Attacks
All information systems can be represented by a conceptual and abstracted systems diagram. Therefore all attacks against information systems can also be ted. By studying the securi...
Terry Roebuck