Sciweavers

1028 search results - page 21 / 103
» Using Attack Graphs to Design Systems
Sort
View
200 views 107 votes 16 years 2 months ago  DAC 2007»
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
137 views 102 votes 15 years 7 months ago  HICSS 2007»
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
129 views 112 votes 15 years 2 months ago  ISCAPDCS 2004»
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
129 views 104 votes 15 years 7 months ago  IEEEARES 2006»
-- Domain Name Systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are e...
171 views 117 votes 15 years 6 months ago  CHI 2010»
We present a tangible user interface (TUI) called Tangible Graph Builder, that has been designed to allow visually impaired users to access graph and chart-based data. We describe...
94 views 103 votes 15 years 6 months ago  RSP 2005»
Modeling DSP applications through coarse-grain dataflow graphs is popular in the DSP design community, and a growing set of rapid prototyping tools support such dataflow semantics...
151 views 120 votes 15 years 2 months ago  PDPTA 2000»
In this paper, a Shopping Information Agent System (SIAS) is built based on mobile agent technology. It sends out agents to di erent hosts in an electronic marketplace. The agents ...
142 views 104 votes 15 years 7 months ago  HICSS 2006»
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
115 views 111 votes 15 years 1 months ago  BMCBI 2008»
Background: Graphs and networks are common analysis representations for biological systems. Many traditional graph algorithms such as k-clique, k-coloring, and subgraph matching h...
454 views 114 votes 15 years 3 months ago  WSC 2007»
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....