Sciweavers

1748 search results - page 67 / 350
» Security Models for Heterogeneous Networking
Sort
View
136
Voted
WAPCV
2004
Springer
15 years 8 months ago
TarzaNN: A General Purpose Neural Network Simulator for Visual Attention Modeling
A number of computational models of visual attention exist, but making comparisons is difficult due to the incompatible implementations and levels at which the simulations are con...
Albert L. Rothenstein, Andrei Zaharescu, John K. T...
IEEEARES
2009
IEEE
15 years 10 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
141
Voted
COMPSAC
2008
IEEE
15 years 10 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
140
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
121
Voted
ISI
2007
Springer
15 years 9 months ago
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Cyril Onwubiko, Andrew P. Lenaghan