Sciweavers

1028 search results - page 3 / 103
» Using Attack Graphs to Design Systems
Sort
View
222 views 146 votes 13 years 10 months ago  COMSNETS 2012»
—Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glanc...
228 views 176 votes 15 years 3 months ago  CONEXT 2009»
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
83 views 110 votes 15 years 2 months ago  INFSOF 2007»
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
139 views 146 votes 15 years 13 days ago  GAMESEC 2010»
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
146 views 130 votes 15 years 9 months ago  COMPSAC 2008»
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
131 views 134 votes 15 years 3 months ago  DBSEC 2006»
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
118 views 136 votes 15 years 2 months ago  CORR 2008»
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
170 views 139 votes 15 years 4 months ago  HT 2010»
We investigate the use of autonomically created small-world graphs as a framework for the long term storage of digital objects on the Web in a potentially hostile environment. We ...
108 views 96 votes 16 years 2 months ago  CHI 2005»
The collapse of buildings, such as terminal 2E at Paris' Charles de Gaule Airport, and of fires, such as the Rhode Island, Station Night Club tragedy, has focused public atte...
183 views 120 votes 15 years 7 months ago  RECSYS 2009»
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...