Malicious software is one of the most popular security threats of computer networks. It is difficult for traditional solutions to deal with dynamical and variable behaviors against malicious software. Danger Model the...
详细信息
ISBN:
(纸本)9780769538594
Malicious software is one of the most popular security threats of computer networks. It is difficult for traditional solutions to deal with dynamical and variable behaviors against malicious software. Danger Model theory is a hypothesis of Artificial Immune systems. This hypothesis explains what is malicious from the trend of behaviors in a computer system. This paper presented a novel idea that malicious software is bound to cause changes, and danger signals of Danger Model come from abnormal changes. Staring from monitoring the changes of a computer system, inspired from the principle of differential calculus, a differential coefficient inspired method for malicious software detection is presented, and danger signals can be defined. An example of malicious software is analyzed in this paper, and the result indicated that this method is effective.
Windmill graphs have a crucial role in the field of computer science, mathematics, electrical engineering and physics. Generalized windmill graphs are a generalization of the classic windmill graphs with applications ...
详细信息
This paper describes a methodology of application of smart grid technology for improvement of existing emergency automation system. Existing and new developed automation systems are considered in the paper. Authors ap...
详细信息
This paper describes MTSim, an extensible, customizable simulation platform for the Modechart toolset (MT) [3]. MTSim provides support for 39;39;plugging in39;39; user-defined viewers useful in, simulating sys...
详细信息
ISBN:
(纸本)0818680164
This paper describes MTSim, an extensible, customizable simulation platform for the Modechart toolset (MT) [3]. MTSim provides support for ''plugging in'' user-defined viewers useful in, simulating system behavior in different ways, including application-specific ways. MTSim also supports full user participation an the generation of simulations by allowing users to inject events into the execution trace. Moreover, MTSim provides monitoring and assertion checking of execution traces and the invocation of user-specified handlers upon assertion violation. This paper also introduces a MTSim component called WebSim, a suite of simulation tools for MT, and an an application-specific component of MTSim, which displays the cock-pit of an F-18 aircraft and models its bomb release function.
softwaresystems have a strong impact on the energy consumption of the hardware they use. For this reason, software developers should be more aware of the energy consumed by their systems. Moreover, softwaresystems s...
详细信息
ISBN:
(纸本)9781538619568
softwaresystems have a strong impact on the energy consumption of the hardware they use. For this reason, software developers should be more aware of the energy consumed by their systems. Moreover, softwaresystems should be developed to be able to adapt their behavior to minimize the energy consumed during their execution. This paper illustrates how to address the problem of developing self-adaptive energy-efficient applications using the HADAS approach. HADAS makes use of advanced softwareengineering methods, such as Dynamic software Product Lines and Aspect-Oriented software Development. The main steps of the HADAS approach, both during the design of the application and also at runtime are illustrated by applying them to a running case study.
Verification of security requirements in embedded systems is a crucial task - especially in very dynamic design processes like a hardware/software codesign flow. In such a case the system39;s modules and components ...
详细信息
ISBN:
(纸本)9783642191244
Verification of security requirements in embedded systems is a crucial task - especially in very dynamic design processes like a hardware/software codesign flow. In such a case the system's modules and components are continuously modified and refined until all constraints are met and the system design is in a stable state. A transaction level model can be used for such a design space exploration in this phase. It is essential that security requirements are considered from the very first beginning. In this work we(1) demonstrate a novel approach how to use meta-information in transaction level models to verify the consistent application of security requirements in embedded systems.
This paper addresses the development of hardware and softwaresystems needed for the operation of a Class II remotely operated vehicle, by using a systemsengineering approach. The concept design included using Qualit...
详细信息
ISBN:
(纸本)9781538603987
This paper addresses the development of hardware and softwaresystems needed for the operation of a Class II remotely operated vehicle, by using a systemsengineering approach. The concept design included using Quality Function Deployment in order to translate stakeholders' needs into engineering characteristics. Then, the functional division of the ROV system was performed, allowing the designers to develop the electronics functional architecture. Solutions for all functions in the electronics system were integrated into a comprehensive hardware architecture that fulfills the user's requirements. Finally, a softwareapplication for the navigation, guidance, and control of the ROV was designed based on the actor model. Verification of some components was performed and showed the functionality of the developed systems. High modularity and low coupling of the resulting solutions enables a multidisciplinary teamwork to integrate efforts seamlessly and efficiently during the development of the ROV.
With the Internet spread and deepening of the application. Internet and e-commerce business development has become an inevitable trend. Network security is more and more attention by people. Therefore, the use of an e...
详细信息
Electroencephalography (EEG) is widely used in the field of neural engineering. EEG signals can describe the brain activities while the subjects with para/tetraplegia perform movement with their limbs. This paper revi...
详细信息
Recent market conditions have forced companies to change their policies regarding systems development. Open architectures and distributed paradigms become first role players in the implementation of flexible, componet...
详细信息
ISBN:
(纸本)0769501222
Recent market conditions have forced companies to change their policies regarding systems development. Open architectures and distributed paradigms become first role players in the implementation of flexible, componetised systems that can easily adjust to changing requirements. However, there is a significant obstacle put across by the legacy, which still performs the main volume of business processes and store the majority of the Enterprise Knowledge. Hence, a problem occurs regarding how we obtain integration of systems and knowledge when the legacy still dominates in the enterprise environment. In this paper we advocate that knowledge repositories may provide a solution by becoming the key components of distributed environments. Repositories support strong mechanisms for meta-level information management and systemsspecification. We present how a repository manages to integarte Enterprise Knowledge and IS at a conceptual level. Subsequently, we analyse the way a repository-bared framework integrates knowledge and software components at a functional level. The analysis is based on the DELOS environment [12]. An example practically exhibits the results achieved.
暂无评论