Sciweavers

304 search results - page 2 / 61
» Measuring the Vulnerability of Interconnection Networks in E...
Sort
View
INFOCOM
1996
IEEE
13 years 10 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
IPPS
2007
IEEE
14 years 17 days ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
OSDI
2006
ACM
14 years 6 months ago
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML
Vulnerability-driven filtering of network data can offer a fast and easy-to-deploy alternative or intermediary to software patching, as exemplified in Shield [43]. In this paper, ...
Charles Reis, John Dunagan, Helen J. Wang, Opher D...
CCS
2008
ACM
13 years 8 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
SIES
2007
IEEE
14 years 16 days ago
Refactoring an Automotive Embedded Software Stack using the Component-Based Paradigm
Abstract— The number of electronic systems in cars is continuously growing. Electronic systems, consisting of so-called electronic control units (ECUs) interconnected by a commun...
Thomas M. Galla, Dietmar Schreiner, Wolfgang Forst...