Sciweavers

1028 search results - page 100 / 103
» Using Attack Graphs to Design Systems
Sort
View
101 views 111 votes 14 years 11 months ago  JCO 2010»
Abstract Polynomial-time data reduction is a classical approach to hard graph problems. Typically, particular small subgraphs are replaced by smaller gadgets. We generalize this ap...
104 views 96 votes 16 years 2 months ago  DAC 2000»
Recently, intellectual property protection (IPP) techniques attracted a great deal of attention from semiconductor, system integration and software companies. A number of watermar...
130 views 87 votes 15 years 5 months ago  CRITIS 2006»
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures....
122 views 105 votes 15 years 5 months ago  ICSE 1999»
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
158 views 122 votes 15 years 8 months ago  SAC 2009»
Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. T...
137 views 123 votes 15 years 1 months ago  CN 2007»
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
93 views 99 votes 15 years 27 days ago  CN 1999»
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
166 views 111 votes 15 years 26 days ago  TEC 2002»
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
131 views 96 votes 15 years 6 months ago  IWIA 2005»
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
102 views 122 votes 15 years 7 months ago  IFIP 2007»
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodit...