Sciweavers

50 search results - page 4 / 10
» Automated Generation and Analysis of Attack Graphs
Sort
View
ITNG
2008
IEEE
15 years 3 months ago
Prototype Generation from Ontology Charts
Semantic Analysis is a business analysis method designed to capture user requirements and represent them as text or in a graph that is called Ontology Chart. Ontology Charts can b...
George Tsaramirsis, Iman Poernomo
76
Voted
INFOCOM
2003
IEEE
15 years 2 months ago
Static and Dynamic Analysis of the Internet's Susceptibility to Faults and Attacks
— We analyze the susceptibility of the Internet to random faults, malicious attacks, and mixtures of faults and attacks. We analyze actual Internet data, as well as simulated dat...
Seung-Taek Park, Alexy Khrabrov, David M. Pennock,...
LOPSTR
2007
Springer
15 years 3 months ago
Termination Analysis of Logic Programs Based on Dependency Graphs
This paper introduces a modular framework for termination analysis of logic programming. To this end, we adapt the notions of dependency pairs and dependency graphs (which were dev...
Manh Thang Nguyen, Jürgen Giesl, Peter Schnei...
PPOPP
2006
ACM
15 years 3 months ago
On-line automated performance diagnosis on thousands of processes
Performance analysis tools are critical for the effective use of large parallel computing resources, but existing tools have failed to address three problems that limit their scal...
Philip C. Roth, Barton P. Miller
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 4 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic