Sciweavers

1028 search results - page 4 / 103
» Using Attack Graphs to Design Systems
Sort
View
131 views 125 votes 15 years 2 months ago  DBSEC 2006»
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
118 views 120 votes 15 years 1 months ago  CORR 2008»
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
170 views 126 votes 15 years 3 months ago  HT 2010»
We investigate the use of autonomically created small-world graphs as a framework for the long term storage of digital objects on the Web in a potentially hostile environment. We ...
108 views 88 votes 16 years 1 months ago  CHI 2005»
The collapse of buildings, such as terminal 2E at Paris' Charles de Gaule Airport, and of fires, such as the Rhode Island, Station Night Club tragedy, has focused public atte...
183 views 113 votes 15 years 5 months ago  RECSYS 2009»
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
127 views 102 votes 15 years 7 months ago  ACSAC 2006»
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
147 views 104 votes 15 years 6 months ago  SIGMETRICS 2005»
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
132 views 116 votes 15 years 5 months ago  EUROMICRO 1996»
Transformational design integrates design and verification. It combines "correctness by construciion" and design creativity by the use ofpre-proven behaviour preserving ...
153 views 109 votes 15 years 6 months ago  ISAAC 2005»
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
94 views 77 votes 15 years 26 days ago  TC 2002»
: In this paper we show how design-level aspects can be used to develop high integrity systems. In our approach, a system designer must first identify the specific mechanisms requi...