Sciweavers

694 search results - page 64 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
COMSWARE
2006
IEEE
15 years 6 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
ICPR
2008
IEEE
15 years 6 months ago
Point-of-interest detection for range data
Point-of-interest detection is a way of reducing the amount of data that needs to be processed in a certain application and is widely used in 2D image analysis. In 2D image analys...
Fredrik Vikstén, Klas Nordberg, Mikael Kalm...
OOPSLA
2001
Springer
15 years 4 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
ESEM
2009
ACM
15 years 3 months ago
An empirical study of security problem reports in Linux distributions
Existing studies on problem reports in open source projects focus primarily on the analysis of the general category of problem reports, or limit their attention to observations on...
Prasanth Anbalagan, Mladen A. Vouk
SASN
2006
ACM
15 years 5 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt