Sciweavers

1028 search results - page 50 / 103
» Using Attack Graphs to Design Systems
Sort
View
124 views 114 votes 15 years 2 months ago  FLAIRS 2003»
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
113 views 122 votes 15 years 2 months ago  PDPTA 2008»
Abstract - With the growth of the Internet and increased demand for Web Services has come a heightened need for scalable wide-area group communication systems. The need for trust i...
116 views 92 votes 15 years 7 months ago  AOSD 2006»
OOP style requires programmers to organize their code according to objects (or nouns, using natural language as a metaphor), causing a program’s actions (verbs) to become scatte...
132 views 111 votes 15 years 5 months ago  CODES 2004»
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
150 views 115 votes 15 years 2 months ago  CSREASAM 2006»
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
166 views 111 votes 15 years 8 months ago  CCS 2009»
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
79 views 81 votes 15 years 7 months ago  IEEEARES 2008»
In this paper, we propose an FDB based intra-Domain Traceback System (FDB-DTS), which is a hybrid traceback system composed of packet digesting boxes and an iterative query engine...
119 views 87 votes 15 years 8 months ago  GLOBECOM 2009»
—Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is...
181 views 90 votes 15 years 5 months ago  FC 2010»
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
183 views 118 votes 15 years 7 months ago  ICPP 2007»
– Anonymous communication systems built on P2P infrastructures using anonymity forwarders are frequently affected by the churn problem, i.e. frequent joins and leaves of nodes. T...