Sciweavers

2213 search results - page 176 / 443
» Software Security
Sort
View
168
Voted
TSE
2008
148views more  TSE 2008»
15 years 3 months ago
Benchmarking Classification Models for Software Defect Prediction: A Proposed Framework and Novel Findings
Software defect prediction strives to improve software quality and testing efficiency by constructing predictive classification models from code attributes to enable a timely ident...
Stefan Lessmann, Bart Baesens, Christophe Mues, Sw...
145
Voted
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
128
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Securing DNS Services through System Self Cleansing and Hardware Enhancements
-- Domain Name Systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are e...
Yih Huang, David Arsenault, Arun Sood
122
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
120
Voted
CSFW
2004
IEEE
15 years 7 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong