To ensure high availability of telephone services, there is considerable interest in network management activities to develop competent fault management mechanisms. In this paper w...
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
1 In this paper we address the problem of selecting probe station locations from where probes can be sent to monitor all the nodes in the network. Probe station placement involves...