Sciweavers

556 search results - page 10 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
97
Voted
CDC
2008
IEEE
139views Control Systems» more  CDC 2008»
15 years 6 months ago
Iterative Risk Allocation: A new approach to robust Model Predictive Control with a joint chance constraint
Abstract— This paper proposes a novel two-stage optimization method for robust Model Predictive Control (RMPC) with Gaussian disturbance and state estimation error. Since the dis...
Masahiro Ono, Brian C. Williams
TDSC
2010
172views more  TDSC 2010»
14 years 6 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
TSC
2010
130views more  TSC 2010»
14 years 6 months ago
Secure Abstraction Views for Scientific Workflow Provenance Querying
bstraction Views for Scientific Workflow Provenance Querying Artem Chebotko, Member, IEEE, Shiyong Lu, Senior Member, IEEE, Seunghan Chang, Farshad Fotouhi, Member, IEEE, and Ping ...
Artem Chebotko, Shiyong Lu, Seunghan Chang, Farsha...
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
15 years 5 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
ACSAC
2009
IEEE
15 years 6 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...