Sciweavers

1028 search results - page 22 / 103
» Using Attack Graphs to Design Systems
Sort
View
94 views 103 votes 15 years 6 months ago  RSP 2005»
Modeling DSP applications through coarse-grain dataflow graphs is popular in the DSP design community, and a growing set of rapid prototyping tools support such dataflow semantics...
151 views 120 votes 15 years 2 months ago  PDPTA 2000»
In this paper, a Shopping Information Agent System (SIAS) is built based on mobile agent technology. It sends out agents to di erent hosts in an electronic marketplace. The agents ...
142 views 104 votes 15 years 7 months ago  HICSS 2006»
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
115 views 111 votes 15 years 1 months ago  BMCBI 2008»
Background: Graphs and networks are common analysis representations for biological systems. Many traditional graph algorithms such as k-clique, k-coloring, and subgraph matching h...
454 views 114 votes 15 years 3 months ago  WSC 2007»
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
160 views 106 votes 15 years 2 months ago  FLAIRS 2003»
The goal of the MavHome smart home project is to build an intelligent home environment that is aware of its inhabitants and their activities. Such a home is designed to provide ma...
219 views 151 votes 15 years 7 months ago  PKC 2007»
At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce...
103 views 99 votes 15 years 1 months ago  JNW 2008»
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
203 views 121 votes 15 years 1 months ago  WISEC 2010»
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
130 views 130 votes 15 years 4 months ago  MSS 2000»
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...