Sciweavers

1222 search results - page 109 / 245
» Verifying a File System Implementation
Sort
View
SAC
2010
ACM
15 years 2 months ago
Improving the efficiency of dynamic malware analysis
Each day, security companies see themselves confronted with thousands of new malware programs. To cope with these large quantities, researchers and practitioners alike have develo...
Ulrich Bayer, Engin Kirda, Christopher Kruegel
SEUS
2009
IEEE
15 years 9 months ago
Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems
Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnects. Such network inte...
Hyun-Wook Jin, Junbeom Yoo
JSS
2006
153views more  JSS 2006»
15 years 2 months ago
Towards the automatic generation of mobile agents for distributed intrusion detection system
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to b...
Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Gu...
108
Voted
ICCBR
2003
Springer
15 years 8 months ago
SOFT-CBR: A Self-Optimizing Fuzzy Tool for Case-Based Reasoning
A generic Case-Based Reasoning tool has been designed, implemented, and successfully used in two distinct applications. SOFT-CBR can be applied to a wide range of decision problems...
Kareem S. Aggour, Marc Pavese, Piero P. Bonissone,...
119
Voted
IWPC
2002
IEEE
15 years 7 months ago
Architecture Recovery of Dynamically Linked Applications: A Case Study
Most previously published case studies in architecture recovery have been performed on statically linked software systems. Due to the increase in use of middleware technologies, s...
Igor Ivkovic, Michael W. Godfrey