Sciweavers

1028 search results - page 102 / 206
» Using Attack Graphs to Design Systems
Sort
View
132
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
MIND: A Distributed Multi-Dimensional Indexing System for Network Diagnosis
— Detecting coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have two logically distinct elements: ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...
125
Voted
DOA
2001
94views more  DOA 2001»
15 years 4 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
134
Voted
IPPS
2006
IEEE
15 years 8 months ago
Battery aware dynamic scheduling for periodic task graphs
Battery lifetime, a primary design constraint for mobile embedded systems, has been shown to depend heavily on the load current profile. This paper explores how scheduling guidel...
V. Rao, N. Navet, G. Singhal, A. Kumar, G. S. Visw...
WCRE
2005
IEEE
15 years 8 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
ICSE
2007
IEEE-ACM
16 years 2 months ago
POLUS: A POwerful Live Updating System
This paper presents POLUS, a software maintenance tool capable of iteratively evolving running software into newer versions. POLUS's primary goal is to increase the dependabi...
Haibo Chen, Jie Yu, Rong Chen, Binyu Zang, Pen-Chu...