Cleanroom software engineering: technology and process
Cleanroom software engineering: technology and process
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
Next-Generation Software Engineering Introduction to Minitrack
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Introducing function extraction into software testing
ACM SIGMIS Database
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
Computational Evaluation of Software Security Attributes
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
Toward a Safer and More Secure Cyberspace
Toward a Safer and More Secure Cyberspace
Supervised learning for provenance-similarity of binaries
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Locating executable fragments with Concordia, a scalable, semantics-based architecture
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Hi-index | 0.00 |
Modern society is irreversibly dependent on computer-based infrastructure systems of astonishing scope and complexity. Yet these systems are increasingly vulnerable to disabling intrusions by adversaries equipped with the knowledge and resources to mount sophisticated attacks [1, 2]. Technical and organizational preparation for major attacks is essential to national security. Preparation takes time and effort, and when a major attack occurs, it is too late to prepare. Preparation must provide capability for fast and precise analysis of the technical structure of an attack as a basis for fast response to limit damage and deploy countermeasures.