Sciweavers

42 search results - page 5 / 9
» Windows of Vulnerability: A Case Study Analysis
Sort
View
JTAER
2010
121views more  JTAER 2010»
14 years 8 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
BMCBI
2010
166views more  BMCBI 2010»
14 years 9 months ago
Accurate peak list extraction from proteomic mass spectra for identification and profiling studies
Background: Mass spectrometry is an essential technique in proteomics both to identify the proteins of a biological sample and to compare proteomic profiles of different samples. ...
Nicola Barbarini, Paolo Magni
71
Voted
INFSOF
2007
83views more  INFSOF 2007»
14 years 9 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 3 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...