Sciweavers

1028 search results - page 27 / 103
» Using Attack Graphs to Design Systems
Sort
View
75 views 75 votes 15 years 6 months ago  DATE 2002»
With the term flexibility, we introduce a new design dimension of an embedded system that quantitatively characterizes its feasibility in implementing not only one, but possibly ...
87 views 126 votes 14 years 8 months ago  JCS 2011»
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
108 views 117 votes 15 years 2 months ago  CSREASAM 2004»
Grid systems are designed to support very large data set computations, that potentially access significant resources spread through several organizations. These resources can be v...
116 views 121 votes 15 years 2 months ago  NAACL 2007»
We introduce a simple opinion mining system for analyzing Japanese Weblog reviews called OMS-J. OMS-J is designed to provide an intuitive visual GUI of opinion mining graphs for a...
106 views 97 votes 15 years 2 months ago  ISSA 2004»
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
157 views 126 votes 14 years 11 months ago  ICDM 2010»
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
229 views 117 votes 15 years 3 months ago  ALGOSENSORS 2007»
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
100 views 68 votes 15 years 6 months ago  GECCO 2003»
This paper suggests dense and switched modular primitives for a bond-graph-based GP design framework that automatically synthesizes designs for multi-domain, lumped parameter dynam...
121 views 134 votes 15 years 7 months ago  ACSAC 2008»
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
154 views 112 votes 15 years 2 months ago  CCS 2010»
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...