Sciweavers

ACSAC
2010
IEEE
13 years 2 months ago
Multi-vendor penetration testing in the advanced metering infrastructure
- The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy...
Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Mia...
ISPEC
2010
Springer
13 years 9 months ago
On Fast and Approximate Attack Tree Computations
Abstract. In this paper we address the problem of inefficiency of exact attack tree computations. We propose several implementation-level optimizations and introduce a genetic algo...
Aivo Jürgenson, Jan Willemson
CCS
2007
ACM
13 years 10 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
HICSS
2007
IEEE
131views Biometrics» more  HICSS 2007»
13 years 11 months ago
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System
Online banking has become increasingly important to the profitability of financial institutions as well as adding convenience for their customers. As the number of customers using...
Kenneth S. Edge, Richard A. Raines, Michael R. Gri...