Sciweavers

1028 search results - page 43 / 103
» Using Attack Graphs to Design Systems
Sort
View
201 views 122 votes 14 years 11 months ago  USS 2010»
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
171 views 103 votes 15 years 5 months ago  FC 2010»
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
151 views 113 votes 15 years 7 months ago  WETICE 2007»
Intrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. In an important class of IPS...
113 views 97 votes 15 years 2 months ago  GG 2008»
Abstract Synchronising Graphs is a system of parallel graph transformation designed for modeling process interaction in a network environment. We propose a theory of context-free s...
152 views 123 votes 15 years 3 months ago  CCS 2008»
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
184 views 123 votes 15 years 8 months ago  IEEECIT 2009»
—Software clustering is a method for increasing software system understanding and maintenance. Software designers, first use MDG graph to model the structure of software system. ...
119 views 117 votes 15 years 1 months ago  JCP 2008»
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
170 views 133 votes 15 years 6 months ago  ICCS 2004»
The Data Driven Design Optimization Methodology (DDDOM) is a Dynamic Data Driven Application System (DDDAS) developed for engineering design optimization. The DDDOM synergizes expe...
80 views 92 votes 15 years 1 months ago  CORR 2004»
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
139 views 126 votes 14 years 10 months ago  CASES 2010»
Approximate arithmetic is a promising, new approach to lowenergy designs while tackling reliability issues. We present a method to optimally distribute a given energy budget among...