Sciweavers

1028 search results - page 55 / 103
» Using Attack Graphs to Design Systems
Sort
View
165 views 126 votes 15 years 7 months ago  CODES 2007»
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
137 views 133 votes 15 years 6 months ago  GD 2003»
Given two different drawings of a planar graph we consider the problem of morphing one drawing into the other. We designed and implemented an algorithm for intersection-free morph...
83 views 82 votes 15 years 2 months ago  DIMVA 2004»
: A honeynet is a special prepared network which is not used in normal business. It is a kind of playground to watch and learn the tactics of crackers. The only purpose of a honeyn...
128 views 116 votes 16 years 1 months ago  VLSID 2002»
: In this paper, we present a point-to-point (P2P) communication synthesis methodology for SystemOn-Chip (SOC) design. We consider real-time systems where IP selection, mapping and...
171 views 113 votes 15 years 2 months ago  AVI 2008»
Programming assignments are easy to plagiarize in such a way as to foil casual reading by graders. Graders can resort to automatic plagiarism detection systems, which can generate...
97 views 103 votes 15 years 5 months ago  IPPS 1998»
Studies of the fault-tolerance of graphs have tended to largely concentrate on classical graph connectivity. This measure is very basic, and conveys very little information for des...
120 views 103 votes 15 years 7 months ago  SENSYS 2005»
Archival storage of sensor data is necessary for applications that query, mine, and analyze such data for interesting features and trends. We argue that existing storage systems a...
155 views 134 votes 15 years 6 months ago  SP 2003»
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
116 views 119 votes 15 years 7 months ago  ICC 2007»
Abstract—Skip Tree Graph is a novel, distributed, data structure for peer-to-peer systems that supports exact-match and order-based queries such as range queries efficiently. It...
99 views 102 votes 15 years 5 months ago  ICCAD 1999»
In this paper, an internal design model called FunState (functions driven by state machines) is presented that enables the representation of different types of system components a...