Sciweavers

1028 search results - page 11 / 103
» Using Attack Graphs to Design Systems
Sort
View
197 views 118 votes 15 years 1 months ago  CCS 2010»
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
142 views 91 votes 15 years 7 months ago  ICDCSW 2008»
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important problem and many unfair rat...
156 views 129 votes 15 years 6 months ago  KBSE 2005»
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
92 views 102 votes 15 years 7 months ago  SASO 2008»
Many real–world networks show a scale–free degree distribution, a structure that is known to be very stable in case of random failures. Unfortunately, the very same structure ...
90 views 98 votes 15 years 2 months ago  PST 2004»
All information systems can be represented by a conceptual and abstracted systems diagram. Therefore all attacks against information systems can also be ted. By studying the securi...
152 views 104 votes 15 years 4 months ago  EURODAC 1995»
In order to extract a suitable common core information model, design representations on both system and architecture levels are analyzed. Following the specification trajectory, ...
140 views 135 votes 15 years 7 months ago  HICSS 2007»
This paper presents a graph transformation based approach to design pattern evolution. An evolution of a design pattern includes modifications of pattern elements, such as classes...
125 views 92 votes 15 years 6 months ago  ITCC 2005»
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
98 views 84 votes 15 years 1 months ago  CN 2006»
We investigate the resiliency of the Internet at the Autonomous System (AS) level to failures and attacks, under the real constraint of business agreements between the ASs. The ag...
126 views 114 votes 15 years 7 months ago  CEC 2007»
— Determining the optimal topology of a graph is pertinent to many domains, as graphs can be used to model a variety of systems. Evolutionary algorithms constitute a popular opti...