Sciweavers

1028 search results - page 101 / 103
» Using Attack Graphs to Design Systems
Sort
View
137 views 123 votes 15 years 1 months ago  CN 2007»
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
93 views 99 votes 15 years 27 days ago  CN 1999»
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
166 views 111 votes 15 years 26 days ago  TEC 2002»
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
131 views 96 votes 15 years 6 months ago  IWIA 2005»
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
102 views 122 votes 15 years 7 months ago  IFIP 2007»
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodit...
90 views 120 votes 15 years 7 months ago  INFOCOM 2006»
— Detecting coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have two logically distinct elements: ...
94 views 112 votes 15 years 2 months ago  DOA 2001»
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
165 views 122 votes 15 years 7 months ago  IPPS 2006»
Battery lifetime, a primary design constraint for mobile embedded systems, has been shown to depend heavily on the load current profile. This paper explores how scheduling guidel...
122 views 123 votes 15 years 6 months ago  WCRE 2005»
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
105 views 81 votes 16 years 1 months ago  ICSE 2007»
This paper presents POLUS, a software maintenance tool capable of iteratively evolving running software into newer versions. POLUS's primary goal is to increase the dependabi...