Sciweavers

1028 search results - page 23 / 103
» Using Attack Graphs to Design Systems
Sort
View
160 views 106 votes 15 years 2 months ago  FLAIRS 2003»
The goal of the MavHome smart home project is to build an intelligent home environment that is aware of its inhabitants and their activities. Such a home is designed to provide ma...
219 views 151 votes 15 years 7 months ago  PKC 2007»
At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce...
103 views 99 votes 15 years 1 months ago  JNW 2008»
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
203 views 121 votes 15 years 1 months ago  WISEC 2010»
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
130 views 130 votes 15 years 4 months ago  MSS 2000»
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
119 views 128 votes 15 years 27 days ago  TEC 2002»
Abstract--In this paper, we present an efficient graph-based evolutionary optimization technique called evolutionary graph generation (EGG) and the proposed approach is applied to ...
277 views 166 votes 15 years 7 months ago  DASC 2006»
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
179 views 100 votes 15 years 3 months ago  DAC 2008»
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
153 views 100 votes 15 years 6 months ago  INFOCOM 2003»
— We analyze the susceptibility of the Internet to random faults, malicious attacks, and mixtures of faults and attacks. We analyze actual Internet data, as well as simulated dat...
189 views 111 votes 15 years 2 months ago  SIMUTOOLS 2008»
We sketch the fundamental properties and features of Snoopy, a tool to model and execute (animate, simulate) hierarchical graph-based system descriptions. The tool comes along wit...