Sciweavers

499 search results - page 37 / 100
» A Study on Latent Vulnerabilities
Sort
View
119
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 17 days ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
GAMESEC
2010
139views Game Theory» more  GAMESEC 2010»
14 years 10 months ago
Design of Network Topology in an Adversarial Environment
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
Assane Gueye, Jean C. Walrand, Venkat Anantharam
81
Voted
INFOCOM
2012
IEEE
13 years 2 months ago
Firewall fingerprinting
—Firewalls are critical security devices handling all traffic in and out of a network. Firewalls, like other software and hardware network devices, have vulnerabilities, which c...
Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex ...
90
Voted
CSFW
1999
IEEE
15 years 4 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
FC
2008
Springer
85views Cryptology» more  FC 2008»
15 years 2 months ago
Countermeasures against Government-Scale Monetary Forgery
Abstract. Physical cash is vulnerable to rising threats, such as large-scale, government-mandated forgeries, that digital cash may protect against more effectively. We study mechan...
Alessandro Acquisti, Nicolas Christin, Bryan Parno...