Sciweavers

2429 search results - page 232 / 486
» Using Aspects to Design a Secure System
Sort
View
164
Voted
ECBS
2011
IEEE
271views Hardware» more  ECBS 2011»
14 years 3 months ago
MoPED: A Model-Based Provisioning Engine for Dependability in Component-Based Distributed Real-Time Embedded Systems
—Developing dependable distributed real-time and embedded (DRE) systems incurs significant complexities in the tradeoffs resulting from the different conflicting attributes of ...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
122
Voted
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
15 years 9 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
108
Voted
SAFECOMP
2010
Springer
15 years 2 months ago
Computational Concerns in the Integration of Unmanned Airborne Systems into Controlled Airspace
Unmanned Airborne Systems (UAS) offer significant benefits for long duration missions. They can also be used in situations where it is inappropriate to expose aircrew to increased ...
Christopher W. Johnson
135
Voted
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
15 years 5 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
103
Voted
CHI
2009
ACM
16 years 4 months ago
Understanding how and why open source contributors use diagrams in the development of Ubuntu
Some of the most interesting differences between Open Source Software (OSS) development and commercial colocated software development lie in the communication and collaboration pr...
Koji Yatani, Eunyoung Chung, Carlos Jensen, Khai N...