Sciweavers

1278 search results - page 15 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
ISNN
2005
Springer
15 years 7 months ago
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
Abstract. In ISNN’04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the secur...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
118
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
99
Voted
JNW
2006
55views more  JNW 2006»
15 years 1 months ago
On Stochastic Modeling for Integrated Security and Dependability Evaluation
This paper presents a new approach to integrated security and dependability evaluation, which is based on stochastic modeling techniques. Our proposal aims to provide operational m...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
138
Voted
IEEECIT
2010
IEEE
15 years 11 days ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang
150
Voted
APNOMS
2008
Springer
15 years 3 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi