We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Realizing business value and identifying the benefits arising from implementations of enterprise systems remains a significant challenge for both research and practice. A review o...
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...
Some aspects of digitizing old printed maps and suitable forms of storing are pointed to discussion. Questions arising about practical use of a resolution level, which is necessar...
Abstract. It is a well-known result that the set of reachable stack contents in a pushdown automaton is a regular set of words. We consider the more general case of higher-order pu...