Sciweavers

1028 search results - page 30 / 103
» Using Attack Graphs to Design Systems
Sort
View
141 views 100 votes 15 years 7 months ago  ICMCS 2006»
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
138 views 114 votes 15 years 6 months ago  CCS 2004»
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
116 views 119 votes 14 years 8 months ago  CORR 2010»
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
129 views 89 votes 15 years 7 months ago  CDC 2008»
— We take a structural approach to the problem of designing the edge weights in an undirected graph subject to an upper bound on their total, so as to maximize the algebraic conn...
103 views 116 votes 15 years 6 months ago  AGTIVE 2003»
Abstract. This paper deals with knowledge-based computer aided design. A novel method giving additional support for conceptual design is presented. In this method, a designer firs...
157 views 98 votes 15 years 7 months ago  CHES 2007»
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
166 views 85 votes 15 years 1 months ago  IJNSEC 2008»
The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper,...
182 views 117 votes 15 years 8 months ago  VLSID 2009»
Abstract— This paper introduces a fuzzy logic based guidance architecture to a graph grammar framework for automated design of analog circuits. The grammar generates circuit topo...
169 views 113 votes 15 years 7 months ago  IWNAS 2008»
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
178 views 119 votes 15 years 8 months ago  ICASSP 2009»
We present a factor graph based design of a receiver for pilotassisted OFDM-IDMA systems transmitting over frequency-selective channels. The receiver performs joint iterative mult...