Sciweavers

1278 search results - page 8 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
84
Voted
CCS
2010
ACM
14 years 11 months ago
Demonstrating cognitive packet network resilience to worm attacks
The need for network stability and reliability has led to the growth of autonomic networks [2] that can provide more stable and more reliable communications via on-line measuremen...
Georgia Sakellari, Erol Gelenbe
83
Voted
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 6 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang
IJNGC
2010
75views more  IJNGC 2010»
14 years 6 months ago
Measuring Security Risk of Networks Using Attack Graphs
Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Ja...
ICDCS
2008
IEEE
15 years 6 months ago
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs
Null data frames are a special but important type of frames in IEEE 802.11 based Wireless Local Area Networks (e.g., 802.11 WLANs). They are widely used for power management, chan...
Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia...
FMCO
2003
Springer
154views Formal Methods» more  FMCO 2003»
15 years 4 months ago
Tools for Generating and Analyzing Attack Graphs
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
Oleg Sheyner, Jeannette M. Wing