Sciweavers

8377 search results - page 77 / 1676
» Scenarios - Introduction
Sort
View
IWIA
2006
IEEE
15 years 5 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
LCN
2006
IEEE
15 years 5 months ago
Identification of Network Bricks in Heterogeneous Scenarios
Alessio Botta, Antonio Pescapè, Giorgio Ven...
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 5 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...