Sciweavers

274 search results - page 39 / 55
» Security user studies: methodologies and best practices
Sort
View
WISEC
2010
ACM
15 years 4 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
DFG
2004
Springer
15 years 3 months ago
Combining Formal Methods and Safety Analysis - The ForMoSA Approach
In the ForMoSA project [17] an integrated approach for safety analysis of critical, embedded systems has been developed. The approach brings together the best of engineering practi...
Frank Ortmeier, Andreas Thums, Gerhard Schellhorn,...
JSS
2002
67views more  JSS 2002»
14 years 9 months ago
Fundamental principles of software engineering - a journey
A set of fundamental principles can act as an enabler in the establishment of a discipline; however, software engineering still lacks a set of universally recognized fundamental p...
Pierre Bourque, Robert Dupuis, Alain Abran, James ...
SOPR
1998
117views more  SOPR 1998»
14 years 9 months ago
Towards mature IT services
Many organizations provide information technology services, either to external or internal customers. They maintain software, operate information systems, manage and maintain work...
Frank Niessink, Hans van Vliet
CODASPY
2012
13 years 5 months ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning