Sciweavers

2213 search results - page 215 / 443
» Software Security
Sort
View
120
Voted
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 3 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
ITNG
2008
IEEE
15 years 10 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson
ISSE
2011
14 years 10 months ago
Time-triggered buffers for event-based middleware systems
Application developers utilizing event-based middleware have sought to leverage domain-specific modeling for the advantages of intuitive specification, code synthesis, and suppo...
Jonathan Sprinkle, Brandon Eames
SOUPS
2005
ACM
15 years 9 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
COMPSEC
2006
90views more  COMPSEC 2006»
15 years 3 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...