Sciweavers

1028 search results - page 24 / 103
» Using Attack Graphs to Design Systems
Sort
View
119 views 128 votes 15 years 27 days ago  TEC 2002»
Abstract--In this paper, we present an efficient graph-based evolutionary optimization technique called evolutionary graph generation (EGG) and the proposed approach is applied to ...
277 views 166 votes 15 years 7 months ago  DASC 2006»
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
179 views 100 votes 15 years 3 months ago  DAC 2008»
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
153 views 100 votes 15 years 6 months ago  INFOCOM 2003»
— We analyze the susceptibility of the Internet to random faults, malicious attacks, and mixtures of faults and attacks. We analyze actual Internet data, as well as simulated dat...
189 views 111 votes 15 years 2 months ago  SIMUTOOLS 2008»
We sketch the fundamental properties and features of Snoopy, a tool to model and execute (animate, simulate) hierarchical graph-based system descriptions. The tool comes along wit...
138 views 119 votes 14 years 11 months ago  SPRINGSIM 2010»
This paper presents a distributed Bayesian fault diagnosis scheme for physical systems. Our diagnoser design is based on a procedure for factoring the global system bond graph (BG...
101 views 124 votes 15 years 7 months ago  INFOCOM 2006»
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
123 views 115 votes 15 years 6 months ago  WCRE 2002»
Over the past few years, we are experiencing a surge of evolution problems related to legacy object-oriented systems. Object orientation provides means for systems to be well-desi...
161 views 142 votes 15 years 6 months ago  SIGCOMM 2004»
Name services are critical for mapping logical resource names to physical resources in large-scale distributed systems. The Domain Name System (DNS) used on the Internet, however,...
120 views 97 votes 15 years 7 months ago  INFOCOM 2008»
—The design of computer and communication systems has been based, for decades, on the fundamental assumption that the objective of all users is to improve their own performance. ...