Sciweavers

694 search results - page 54 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
OOPSLA
2007
Springer
15 years 6 months ago
Understanding the value of program analysis tools
It is difficult to determine the cost effectiveness of program analysis tools because we cannot evaluate them in the same environment where we will be using the tool. Tool evalua...
Ciera Jaspan, I-Chin Chen, Anoop Sharma
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 6 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
SP
2002
IEEE
14 years 11 months ago
Stateful Intrusion Detection for High-Speed Networks
As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detec...
Christopher Krügel, Fredrik Valeur, Giovanni ...
EMISA
2010
Springer
14 years 6 months ago
Investigating the Process of Process Modeling with Cheetah Experimental Platform
Abstract. When assessing the usability of BPM technologies enterprises have to rely on vendor promises or qualitative data rather than on empirical or experimental research. To add...
Jakob Pinggera, Stefan Zugal, Barbara Weber
ACSAC
2007
IEEE
15 years 6 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...