Sciweavers

1028 search results - page 46 / 103
» Using Attack Graphs to Design Systems
Sort
View
159 views 107 votes 15 years 8 months ago  ACSAC 2009»
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
151 views 115 votes 15 years 5 months ago  ISSS 1999»
In order to cope with the ever increasing complexity of todays application specific integrated circuits, a building block based design methodology is established. The system is co...
256 views 144 votes 15 years 7 months ago  IDEAS 2008»
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
141 views 103 votes 15 years 6 months ago  GG 2004»
Biochemical pathways, such as metabolic, regulatory, and signal transduction pathways, constitute complex networks of functional and physical interactions between molecular species...
163 views 101 votes 15 years 1 months ago  ENTCS 2006»
In recent years several successful GALS realizations have been presented. The core of a GALS system is a locally synchronous island that is designed using industry standard synchr...
165 views 132 votes 15 years 5 months ago  AGTIVE 1999»
Abstract. In the paper Support for Design Patterns through Graph Transformation Tools in this volume, we have already outlined the global structure of a tool that allows for the an...
177 views 119 votes 15 years 8 months ago  PADS 2009»
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
129 views 115 votes 15 years 7 months ago  SP 2008»
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
163 views 122 votes 15 years 6 months ago  ATAL 2005»
Whilst tools assist the various tasks required to develop a multi-agent system (MAS), yet there still remains a gap between the generation of MAS models and program code. AUML dev...
176 views 124 votes 15 years 1 months ago  RTS 2006»
Component middleware provides dependable and efficient platforms that support key functional, and quality of service (QoS) needs of distributed real-time embedded (DRE) systems. C...