Sciweavers

1028 search results - page 48 / 103
» Using Attack Graphs to Design Systems
Sort
View
143 views 121 votes 15 years 5 months ago  ICLP 2010»
Within the last years, especially since the work proposed by Dung in 1995, argumentation has emerged as a central issue in Artificial Intelligence. With the so called argumentatio...
281 views 145 votes 13 years 9 months ago  PAM 2012»
This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily invo...
125 views 121 votes 15 years 6 months ago  ISSS 2002»
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
134 views 111 votes 15 years 7 months ago  IPPS 2007»
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
191 views 116 votes 15 years 4 months ago  CCS 2010»
Recommender systems are used to predict user preferences for products or services. In order to seek better prediction techniques, data owners of recommender systems such as Netfli...
119 views 91 votes 16 years 2 months ago  WWW 2004»
The goal is to build a general framework for ad hoc applications over large networks using semantics and complex systems analysis. The first part deals with semantics because appl...
168 views 166 votes 15 years 5 months ago  WOSP 1998»
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...
94 views 111 votes 15 years 7 months ago  ICSM 2006»
The association between the description of a concern (e.g., a feature) and the code that implements it is valuable information that can degrade as the code of a system evolves. We...
120 views 99 votes 15 years 8 months ago  ATAL 2009»
Traders in electronic marketplaces may behave dishonestly, cheating other agents. A multitude of trust and reputation systems have been proposed to try to cope with the problem of...
133 views 84 votes 15 years 7 months ago  IPCCC 2006»
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...