Sciweavers

1028 search results - page 58 / 103
» Using Attack Graphs to Design Systems
Sort
View
243 views 102 votes 15 years 7 months ago  IISWC 2008»
The design and evaluation of microprocessor architectures is a difficult and time-consuming task. Although small, handcoded microbenchmarks can be used to accelerate performance e...
156 views 137 votes 15 years 5 months ago  RSP 2000»
Dataflow programming has proven to be popular for representing applications in rapid prototyping tools for digital signal processing (DSP); however, existing dataflow design tools...
93 views 93 votes 16 years 2 months ago  DAC 2006»
Simulation and verification using electronic design automation (EDA) tools are key steps in the design process for communication and signal processing systems. The synchronous dat...
141 views 126 votes 16 years 28 days ago  MOBISYS 2004»
The 802.11 IEEE Standard has enabled low cost and effective wireless LAN services (WLAN). With the sales and deployment of WLAN based networks exploding, many people believe that ...
106 views 123 votes 15 years 7 months ago  VEE 2006»
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
179 views 139 votes 15 years 2 months ago  HPDC 2010»
Modern scientific collaborations have opened up the opportunity of solving complex problems that involve multidisciplinary expertise and large-scale computational experiments. The...
119 views 91 votes 15 years 1 months ago  IJNSEC 2007»
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
122 views 80 votes 15 years 6 months ago  ICALP 2010»
We show that the downward-closure of a Petri net language is effectively computable. This is mainly done by using the notions defined for showing decidability of the reachability...
257 views 136 votes 15 years 5 months ago  SACRYPT 1998»
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
76 views 94 votes 15 years 7 months ago  PET 2007»
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...