Sciweavers

1028 search results - page 12 / 103
» Using Attack Graphs to Design Systems
Sort
View
152 views 104 votes 15 years 4 months ago  EURODAC 1995»
In order to extract a suitable common core information model, design representations on both system and architecture levels are analyzed. Following the specification trajectory, ...
140 views 135 votes 15 years 7 months ago  HICSS 2007»
This paper presents a graph transformation based approach to design pattern evolution. An evolution of a design pattern includes modifications of pattern elements, such as classes...
125 views 92 votes 15 years 6 months ago  ITCC 2005»
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
98 views 84 votes 15 years 1 months ago  CN 2006»
We investigate the resiliency of the Internet at the Autonomous System (AS) level to failures and attacks, under the real constraint of business agreements between the ASs. The ag...
126 views 114 votes 15 years 7 months ago  CEC 2007»
— Determining the optimal topology of a graph is pertinent to many domains, as graphs can be used to model a variety of systems. Evolutionary algorithms constitute a popular opti...
118 views 150 votes 14 years 11 months ago  JNW 2008»
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
150 views 89 votes 15 years 3 months ago  CCS 2008»
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
131 views 94 votes 15 years 6 months ago  DRM 2004»
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
175 views 103 votes 15 years 6 months ago  PRICAI 2004»
We propose a methodology for representing artificial creatures like 3D flowers. Directed graph and Lindenmayer system (L-system) are commonly involved in AI-based creativity resear...
84 views 101 votes 15 years 1 months ago  ALIFE 2004»
The concept of "self-protection", a capability of an organism to protect itself from exogenous attacks, is introduced to the design of artificial evolutionary systems as...