Sciweavers

1028 search results - page 51 / 103
» Using Attack Graphs to Design Systems
Sort
View
166 views 111 votes 15 years 8 months ago  CCS 2009»
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
79 views 81 votes 15 years 7 months ago  IEEEARES 2008»
In this paper, we propose an FDB based intra-Domain Traceback System (FDB-DTS), which is a hybrid traceback system composed of packet digesting boxes and an iterative query engine...
119 views 87 votes 15 years 8 months ago  GLOBECOM 2009»
—Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is...
181 views 90 votes 15 years 5 months ago  FC 2010»
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
183 views 118 votes 15 years 7 months ago  ICPP 2007»
– Anonymous communication systems built on P2P infrastructures using anonymity forwarders are frequently affected by the churn problem, i.e. frequent joins and leaves of nodes. T...
102 views 90 votes 15 years 7 months ago  IEEEIAS 2008»
: This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a...
104 views 100 votes 15 years 5 months ago  INFOCOM 2000»
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
84 views 101 votes 15 years 1 months ago  CORR 2007»
Entanglement is a complexity measure of directed graphs that origins in fixed point theory. This measure has shown its use in designing efficient algorithms to verify logical prop...
66 views 90 votes 15 years 1 months ago  SIAMCOMP 2000»
We consider a system of uniform recurrence equations (URE) of dimension one. We show how its computation can be carried out using minimal memory size with several synchronous proc...
109 views 108 votes 15 years 7 months ago  AE 2007»
Abstract. We follow up on the work of Ebner[1] in studying representations for evolutionary design of objects. We adopt both the method and the simulation framework, and perform mo...