Sciweavers

1028 search results - page 106 / 206
» Using Attack Graphs to Design Systems
Sort
View
CIMCA
2005
IEEE
15 years 3 months ago
Fibered Guard - A Hybrid Intelligent Approach to Denial of Service Prevention
This paper describes the system “Fibered Guard”, which is a hybrid intelligent web access management approach for the prevention of Denial of Service (DoS) and Distributed Deni...
Marvin Oliver Schneider, Jacques Calmet
ACSW
2006
14 years 11 months ago
Formal analysis of secure contracting protocol for e-tendering
Formal specification and verification of protocols have been credited for uncovering protocol flaws; revealing inadequacies in protocol design of the Initial Stage and Negotiation...
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond...
CDC
2010
IEEE
144views Control Systems» more  CDC 2010»
14 years 4 months ago
Effect of network structure on the stability margin of large vehicle formation with distributed control
We study the problem of distributed control of a large network of double-integrator agents to maintain a rigid formation. A few lead vehicles are given information on the desired t...
He Hao, Prabir Barooah, J. J. P. Veerman
CIVR
2007
Springer
178views Image Analysis» more  CIVR 2007»
15 years 3 months ago
Layout indexing of trademark images
Ensuring the uniqueness of trademark images and protecting their identities are the most important objectives for the trademark registration process. To prevent trademark infringe...
Reinier H. van Leuken, M. Fatih Demirci, Victoria ...
ICRA
1999
IEEE
142views Robotics» more  ICRA 1999»
15 years 2 months ago
Development of BEST Nano-robot Soccer Team
In this paper, we describe the development of our BEST nano-robot soccer team composed of 5 robots, a vision system, and communication modules. Each nano-robot is designed with an...
Sung Ho Kim, JongSuk Choi, Byung Kook Kim