Sciweavers

1028 search results - page 47 / 103
» Using Attack Graphs to Design Systems
Sort
View
165 views 132 votes 15 years 5 months ago  AGTIVE 1999»
Abstract. In the paper Support for Design Patterns through Graph Transformation Tools in this volume, we have already outlined the global structure of a tool that allows for the an...
177 views 119 votes 15 years 8 months ago  PADS 2009»
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
129 views 115 votes 15 years 7 months ago  SP 2008»
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
163 views 122 votes 15 years 6 months ago  ATAL 2005»
Whilst tools assist the various tasks required to develop a multi-agent system (MAS), yet there still remains a gap between the generation of MAS models and program code. AUML dev...
176 views 124 votes 15 years 1 months ago  RTS 2006»
Component middleware provides dependable and efficient platforms that support key functional, and quality of service (QoS) needs of distributed real-time embedded (DRE) systems. C...
143 views 121 votes 15 years 5 months ago  ICLP 2010»
Within the last years, especially since the work proposed by Dung in 1995, argumentation has emerged as a central issue in Artificial Intelligence. With the so called argumentatio...
281 views 145 votes 13 years 9 months ago  PAM 2012»
This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily invo...
125 views 121 votes 15 years 6 months ago  ISSS 2002»
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
134 views 111 votes 15 years 7 months ago  IPPS 2007»
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
191 views 116 votes 15 years 4 months ago  CCS 2010»
Recommender systems are used to predict user preferences for products or services. In order to seek better prediction techniques, data owners of recommender systems such as Netfli...