Sciweavers

1028 search results - page 41 / 103
» Using Attack Graphs to Design Systems
Sort
View
81 views 109 votes 15 years 7 months ago  ICSM 2007»
The build system forms an indispensable part of any software project. It needs to evolve in parallel with the source code in order to build, test and install the software. Unfortu...
138 views 96 votes 16 years 2 months ago  WWW 2006»
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
115 views 121 votes 15 years 6 months ago  PET 2004»
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication s...
107 views 158 votes 14 years 8 months ago  TIP 2010»
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
274 views 121 votes 15 years 8 months ago  CCS 2009»
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
147 views 133 votes 14 years 11 months ago  IJIPT 2010»
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
124 views 140 votes 16 years 2 months ago  SIGSOFT 2003»
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
246 views 197 votes 14 years 4 months ago  ICITS 2011»
In this paper, we use the concept of colored edge graphs to model homogeneous faults in networks. We then use this model to study the minimum connectivity (and design) requirements...
198 views 79 votes 15 years 5 months ago  IV 1999»
Java3D is an application-centred approach to building 3D worlds. We use Java3D and VRML to design a prototype WWW-based 3D Hotel Browsing system. A Java3D scene graph viewer was i...
192 views 103 votes 16 years 2 months ago  WWW 2008»
We propose a hybridization of collaborative filtering and content based recommendation system. Attributes used for content based recommendations are assigned weights depending on ...