Sciweavers

562 search results - page 7 / 113
» Attack graph generation and analysis
Sort
View
DIAL
2006
IEEE
103views Image Analysis» more  DIAL 2006»
15 years 7 months ago
Multi-Queue Merging Scheme And Its Application in Arabic Script Segmentation
It is an important topic for segmentation on how to merge the over-segmented subimages of characters into integral characters. The conventional character segmentation has been mos...
Pingping Xiu, Liangrui Peng, Xiaoqing Ding
105
Voted
CTRSA
2005
Springer
210views Cryptology» more  CTRSA 2005»
15 years 7 months ago
Hold Your Sessions: An Attack on Java Session-Id Generation
HTTP session-id’s take an important role in almost any web site today. This paper presents a cryptanalysis of Java Servlet 128-bit session-id’s and an efficient practical predi...
Zvi Gutterman, Dahlia Malkhi
136
Voted
CORR
2011
Springer
200views Education» more  CORR 2011»
14 years 8 months ago
An Analysis of Optimal Link Bombs
We analyze the recent phenomenon termed a Link Bomb, and investigate the optimal attack pattern for a group of web pages attempting to link bomb a specific web page. The typical ...
Sibel Adali, Tina Liu, Malik Magdon-Ismail
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 1 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin
EOR
2006
65views more  EOR 2006»
15 years 1 months ago
Generation of assembly graphs by systematic analysis of assembly structures
: Aimed at detection of parallel assembly modes, a method for assembly graph construction is described that is based on the systematic generation and analysis of precedence relatio...
Alfred J. D. Lambert