Sciweavers

1028 search results - page 38 / 103
» Using Attack Graphs to Design Systems
Sort
View
135 views 119 votes 15 years 7 months ago  IPPS 2008»
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
178 views 97 votes 15 years 7 months ago  ACSAC 2008»
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
150 views 99 votes 15 years 7 months ago  CCS 2007»
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all ...
142 views 88 votes 16 years 2 months ago  DAC 2009»
Power consumption of system-level on-chip communications is becoming more significant in the overall system-on-chip (SoC) power as technology scales down. In this paper, we propos...
217 views 114 votes 15 years 8 months ago  EUROSEC 2010»
Under conditions of heavy traffic load or sudden traffic bursts, the peak processing throughput of network intrusion detection systems (NIDS) may not be sufficient for inspecting ...
121 views 97 votes 15 years 6 months ago  CCS 2004»
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
178 views 129 votes 15 years 6 months ago  HIPC 2005»
Graph theoretic problems are representative of fundamental computations in traditional and emerging scientific disciplines like scientific computing, computational biology and b...
127 views 90 votes 16 years 2 months ago  WWW 2008»
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
157 views 130 votes 16 years 1 months ago  EUROCRYPT 2009»
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding open problem of "circular encryption," by presenting a public key encrypti...
127 views 99 votes 15 years 7 months ago  SP 2006»
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...