Sciweavers

443 search results - page 43 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
CMS
2010
150views Communications» more  CMS 2010»
15 years 7 hour ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 6 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
WER
2007
Springer
15 years 6 months ago
Test-case Driven versus Checklist-based Inspections of Software Requirements - An Experimental Evaluation
Software inspections have proved to be an effective means to find faults in different software artifacts, and the application of software inspections on requirements specification...
Nina Dzamashvili-Fogelström, Tony Gorschek
SASO
2009
IEEE
15 years 6 months ago
Teleological Software Adaptation
—We examine the use of teleological metareasoning for self-adaptation in game-playing software agents. The goal of our work is to develop an interactive environment in which the ...
Joshua Jones, Chris Parnin, Avik Sinharoy, Spencer...
ISBI
2004
IEEE
16 years 15 days ago
A Software Package for Portable Three-Dimensional Ultrasound Imaging
Currently, portable ultrasound units lack 3-dimensional (3D) image display, limiting their usefulness especially under hostile operating environments where information must be int...
Tiantian Zhang, X. Xu, Xinlin Chen