Sciweavers

7544 search results - page 154 / 1509
» Network Forensics Analysis
Sort
View
141
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 1 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
FGCN
2008
IEEE
132views Communications» more  FGCN 2008»
15 years 10 months ago
Deriving Safety Properties for Home Network System Based on Goal-Oriented Hazard Analysis Model
The home network system (HNS, for short) is comprised of networked home appliances, which achieves various value-added services for home users. Assuring safety of the HNS and the ...
Ben Yan, Masahide Nakamura, Ken-ichi Matsumoto
118
Voted
ICICS
2005
Springer
15 years 9 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
135
Voted
ESWS
2006
Springer
15 years 7 months ago
Semantic Network Analysis of Ontologies
A key argument for modeling knowledge in ontologies is the easy re-use and re-engineering of the knowledge. However, beside consistency checking, current ontology engineering tools...
Bettina Hoser, Andreas Hotho, Robert Jäschke,...
164
Voted
ASC
2007
15 years 3 months ago
An approximate stability analysis of nonlinear systems described by Universal Learning Networks
Stability is one of the most important subjects in control systems. As for the stability of nonlinear dynamical systems, Lyapunov’s direct method and linearized stability analys...
Kotaro Hirasawa, Shingo Mabu, Shinji Eto, Jinglu H...