Sciweavers

2503 search results - page 67 / 501
» Building Computer Network Attacks
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
High-Fidelity Modeling of Computer Network Worms
modeling, such as using epidemic models, has been the general method of choice for understanding and analyzing the high-level effects of worms. However, high-fidelity models, such...
Kalyan S. Perumalla, Srikanth Sundaragopalan
SASN
2004
ACM
15 years 3 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
HPDC
2007
IEEE
15 years 4 months ago
How CN and P2P technologies may help build next-generation grids
With the evolution of technology, Grids cannot be considered any more solely as a federation of a modest number of powerful cluster computers. Trends show that future Grids will i...
Guillaume Pierre
SAC
2009
ACM
15 years 4 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
EMSOFT
2007
Springer
15 years 4 months ago
A communication synthesis infrastructure for heterogeneous networked control systems and its application to building automation
In networked control systems the controller of a physicallydistributed plant is implemented as a collection of tightlyinteracting, concurrent processes running on a distributed ex...
Alessandro Pinto, Luca P. Carloni, Alberto L. Sang...