Benchmarks have historically played a key role in guiding the progress of computer science systems research and development, but have traditionally neglected the areas of availabi...
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
This paper presents a dependency constraint language that allows software architects to restrict the spectrum of dependencies that can be presented in a given software system. The ...
If current process management systems shall be applied to a broad spectrum of applications, they will have to be significantly improved with respect to their technological capabili...
Peter Dadam, Manfred Reichert, Stefanie Rinderle, ...