Sciweavers

19587 search results - page 3754 / 3918
» Systems Engineering for software Engineers
Sort
View
144
Voted
CHIMIT
2007
ACM
15 years 9 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
172
Voted
DSN
2009
IEEE
15 years 8 months ago
HC-BGP: A light-weight and flexible scheme for securing prefix ownership
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing re...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
FMCAD
2009
Springer
15 years 8 months ago
Industrial strength refinement checking
This paper discusses a methodology used on an industrial hardware development project to validate various cache-coherence protocol components. The idea is to use a high level model...
Jesse D. Bingham, John Erickson, Gaurav Singh, Fle...
ICDCSW
2007
IEEE
15 years 8 months ago
A Concept for Flexible Event-Driven Invocation of Distributed Service Compositions
Currently, flexible service compositions are invoked in a centralised manner by process execution engines. Although this approach is widely used for orchestrating web services, it...
Karen Walzer, Jürgen Anke, Alexander Lös...
ACSAC
2004
IEEE
15 years 8 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
« Prev « First page 3754 / 3918 Last » Next »