Sciweavers

1028 search results - page 19 / 103
» Using Attack Graphs to Design Systems
Sort
View
181 views 122 votes 15 years 5 months ago  GECCO 2007»
The multi domain nature of a mechatronic system makes it difficult to model using a single modeling technique over the whole system as varying sets of system variables are require...
135 views 122 votes 15 years 7 months ago  SIGCOMM 2006»
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
142 views 110 votes 15 years 7 months ago  ICPP 2006»
stractions are extensively used to understand and solve challenging computational problems in various scientific and engineering domains. They have particularly gained prominence...
98 views 87 votes 15 years 3 months ago  USENIX 2008»
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
208 views 130 votes 15 years 1 months ago  SIGCOMM 2010»
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
93 views 99 votes 15 years 2 months ago  CASCON 1997»
Often, software architects impose a particular style on the software systems they design. For large software systems, they would like to ensure that the design continues to confor...
162 views 118 votes 14 years 11 months ago  VIROLOGY 2010»
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
102 views 111 votes 15 years 5 months ago  FSE 1998»
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
109 views 100 votes 15 years 4 months ago  KBSE 1995»
Numerical design optimization algorithms are highly sensitive to the particular formulation of the optimization problems they are given. The formulation of the search space, the o...
134 views 107 votes 15 years 7 months ago  IWSOS 2007»
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such...