Sciweavers

1028 search results - page 28 / 103
» Using Attack Graphs to Design Systems
Sort
View
157 views 126 votes 14 years 11 months ago  ICDM 2010»
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
229 views 117 votes 15 years 3 months ago  ALGOSENSORS 2007»
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
100 views 68 votes 15 years 6 months ago  GECCO 2003»
This paper suggests dense and switched modular primitives for a bond-graph-based GP design framework that automatically synthesizes designs for multi-domain, lumped parameter dynam...
121 views 134 votes 15 years 7 months ago  ACSAC 2008»
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
154 views 112 votes 15 years 2 months ago  CCS 2010»
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
133 views 124 votes 15 years 2 months ago  MBUI 2004»
user interface application model dialogue model Design Design Transformation by patterns Transformation by patterns class diagram task model l use model b.-object model device mod...
91 views 98 votes 15 years 7 months ago  WER 2007»
Complex information systems have numerous design variables that are systematically decided upon during the design process. In high-variability systems, some of these decisions are...
129 views 112 votes 15 years 5 months ago  AAIM 2006»
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
236 views 147 votes 14 years 8 months ago  TCOS 2010»
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
304 views 197 votes 15 years 3 months ago  AGTIVE 2007»
Abstract. The DRAGOS database eases the development of graphbased applications by providing a uniform graph-oriented data storage facility. In this paper, we extend the existing da...