نتایج جستجو برای: specification based detection

تعداد نتایج: 3365367  

2004
Robert McGregor William Thomasson David Coppit

Traditional coverage metrics measure the ability of test cases to fully exercise the source code. The assumption is that fully covered code will better test the correct behavior of the software. Unfortunately, there is no guarantee that the software will meet its specification. In this paper, we present a new coverage metric which measures the ability of the test cases to fully exercise the spe...

Journal: :Computer Communications 2014
Christoforos Panos Christos Xenakis Platon Kotzias Ioannis Stavrakakis

The proliferation of mobile computing devices has enabled the utilization of infrastructureless networking as commercial solutions. However, the distributed and cooperative nature of routing in such networks makes them vulnerable to a variety of attacks. This paper proposes a host-based monitoring mechanism, called SIDE that safeguards the operation of the AODV routing protocol. SIDE encompasse...

Journal: :ACM SIGSOFT Software Engineering Notes 1989

2005
Chinyang Henry Tseng Tao Song Poornima Balasubramanyam Calvin Ko Karl N. Levitt

The unique characteristics of mobile ad hoc networks, such as shared wireless channels, dynamic topologies and a reliance on cooperative behavior, makes routing protocols employed by these networks more vulnerable to attacks than routing protocols employed within traditional wired networks. We propose a specification-based intrusion-detection model for ad hoc routing protocols in which network ...

2007
Jimmi Grönkvist Mattias Sköld

A mobile ad hoc network consists of wireless nodes that build a robust radio network without any preexisting infrastructure or centralized servers. However, these networks have inherent vulnerabilities that make them susceptible to malicious attacks. In order to secure ad hoc networks advanced techniques must be used, one efficient solution is to use specification-based intrusion detection, esp...

2007
Pan Jieke João Redol Miguel Correia

Layered network architectures (OSI, TCP/IP) separate functionality in layers, allowing them to be designed and implemented independently. However, from the security point of view, once a lower layer is compromised, the reliability of the higher layers can be impaired. This paper is about the security of the Data Link Layer, which can affect the reliability of higher layers, like TCP, HTTP and o...

2010
Elisabeth Hansson

New challenges within the area of security have arisen due to a relatively new paradigm called mobile ad hoc networks. A mobile ad hoc network consists of wireless nodes that build a radio network without any pre-existing infrastructure or centralized servers. However, these networks have inherent vulnerabilities that make them susceptible to malicious attacks such as denial of service, propaga...

2003
Ivan Balepin Sergei Maltsev Jeff Rowe Karl N. Levitt

One of the most controversial issues in intrusion detection is automating responses to intrusions, which can provide a more efficient, quicker, and precise way to react to an attack in progress than a human. However, it comes with several disadvantages that can lead to a waste of resources, which has so far prevented wide acceptance of automated response-enabled systems. We feel that a structur...

1996
J. Creissac Campos José Creissac Campos Fernando Mário Martins

This paper presents a conceptual design model for user interfaces (MASS) and a general formalism for dialogue specification (Interaction Scripts) which are the most important components of an approach to the methodological, iterative design of Interactive Systems from formal, model-based specification of both the application and the User Interface (UI). This approach allows the integration of b...

Journal: :Inf. Process. Lett. 2001
Lex Bijlsma

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید