Search results

From Navigators

Jump to: navigation, search

  • Publication:Antunes12PhD
    ... a new method is proposed to assist on the evaluation of the compliance of diverse replicas in intrusion-tolerant systems.
    2 KB (316 words) - 16:37, 2 October 2018
  • Project:SUPERCLOUD
    ...poses provider-agnostic resources in a robust manner using primitives from diverse cloud providers.
    3 KB (333 words) - 10:06, 2 October 2018
  • Publication:Sousa2015wheat
    ... machine replication library and running the experiments in geographically-diverse PlanetLab nodes and Amazon EC2 regions. Interestingly, our results show tha
    2 KB (247 words) - 08:14, 9 August 2015
  • Publication:Medeiros2015tese
    diverse activities such as traffic engineering, anomaly detection, and performance
    2 KB (334 words) - 16:33, 2 October 2018
  • NavTalks
    ">Diverse Intrusion-tolerant Systems</span></td> ...roducts, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by s
    69 KB (10,003 words) - 20:37, 7 March 2022
  • Publication:Garcia2011dsn poster rejuvenations
    |title=Diverse OS Rejuvenation for Intrusion Tolerance |Project=Project:DIVERSE, Project:MASSIF,
    1 KB (184 words) - 10:29, 6 June 2016
  • Project:DiSIEM
    ...ucture-related information from open-source intelligence data available on diverse sources from the internet, (3) create new ways for visualising the informat
    2 KB (294 words) - 22:24, 9 December 2021
  • Publication:EDCC 2017
    |title=On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study ...e number of false alarms. In this paper, we study the problem of combining diverse static analysis tools to detect web vulnerabilities, considering four softw
    2 KB (224 words) - 18:01, 9 September 2017
  • Publication:Sousa2015wheat-tech-report
    ... machine replication library and running the experiments in geographically-diverse PlanetLab nodes and Amazon EC2 regions. Interestingly, our results
    2 KB (245 words) - 10:07, 8 June 2018
  • Publication:EDCC 2018
    ...ored to effectively obtain this knowledge, by retrieving information from diverse sources. This paper proposes a fully automated approach to update the IDS k
    2 KB (220 words) - 00:35, 3 July 2018
  • Publication:Computing2018
    |title=An Empirical Study on Combining Diverse Static Analysis Tools for Web Security Vulnerabilities based on Development ...ptable in some scenarios. In this paper, we study the problem of combining diverse ASATs to improve the overall detection of vulnerabilities in web applicatio
    2 KB (261 words) - 09:00, 19 July 2019
  • Publication:BrunoVavalaTese
    ...ng on large data sets, using an abstraction layer that is implementable on diverse trusted hardware architectures.
    3 KB (525 words) - 15:53, 2 October 2018
  • Publication:ManuelMendoncaTese
    ...n operating systems (OS) include many device drivers (DD) produced by very diverse manufactures. Experience has shown that the development of DD is error pron ...and parameters involved in the OS-DD interface. This tool can support very diverse testing operations, including the log of system activity and to reverse eng
    4 KB (622 words) - 15:55, 2 October 2018
  • Publication:Paulo Antunes Tese
    ...ons are ubiquitous in our everyday lives, as they are deployed in the most diverse contexts and support a variety of services. The correctness of these applic
    2 KB (245 words) - 23:56, 4 October 2018
  • Publication:RicardoMorgado Tese
    This dissertation has two main objectives: to study the diverse types of web application vulnerabilities, namely different attacks that exp
    2 KB (288 words) - 00:03, 18 September 2019
  • Publication:MaxCompNetworks19
    ...ns that need to be deployed across multiple trust domains, while enforcing diverse security ...ds. The system scales well for networks of thousands of switches employing diverse topologies and improves on the virtual network acceptance ratio, provider r
    2 KB (278 words) - 14:04, 26 July 2019
  • Publication:FranciscoAraujo Tese
    ...roducts, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by s
    2 KB (331 words) - 00:50, 18 September 2019
  • Publication:Secrypt19 teps
    ... related information (e.g., Indicator of Compromise -IoC) is obtained from diverse and different sources and collected by Threat Intelligence Platforms (TIPs)
    2 KB (252 words) - 00:30, 18 September 2019
  • Publication:DRSS19 slicer
    ...alicious activities in their IT infrastructures. SIEMs receive events from diverse devices of the
    2 KB (233 words) - 00:37, 18 September 2019
  • Publication:PRDC19 slicer
    ...alicious activities in their IT infrastructures. SIEMs receive events from diverse devices of the
    1 KB (197 words) - 00:39, 18 September 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)

Views
Toolbox
Navigators toolbox