Sciweavers

1028 search results - page 59 / 103
» Using Attack Graphs to Design Systems
Sort
View
179 views 139 votes 15 years 2 months ago  HPDC 2010»
Modern scientific collaborations have opened up the opportunity of solving complex problems that involve multidisciplinary expertise and large-scale computational experiments. The...
119 views 91 votes 15 years 1 months ago  IJNSEC 2007»
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
122 views 80 votes 15 years 6 months ago  ICALP 2010»
We show that the downward-closure of a Petri net language is effectively computable. This is mainly done by using the notions defined for showing decidability of the reachability...
257 views 136 votes 15 years 5 months ago  SACRYPT 1998»
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
76 views 94 votes 15 years 7 months ago  PET 2007»
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
111 views 122 votes 16 years 2 months ago  DAC 2006»
Multimedia applications usually have throughput constraints. An implementation must meet these constraints, while it minimizes resource usage and energy consumption. The compute i...
100 views 114 votes 15 years 7 months ago  LCTRTS 2007»
Existing methods place data or code in scratchpad memory, i.e., SPM by either relying on heuristics or resorting to integer programming or mapping it to a graph coloring problem. ...
160 views 102 votes 15 years 6 months ago  DATE 2010»
— In this paper, we examine the impact of application task mapping on the reliability of MPSoC in the presence of single-event upsets (SEUs). We propose a novel soft erroraware d...
132 views 97 votes 15 years 6 months ago  ATAL 2005»
We are concerned with the use of Mobile Agents for information retrieval. A multi-agent system is considered; a number of agents are involved in a collective effort to retrieve di...
119 views 118 votes 15 years 7 months ago  AINA 2008»
—With the increasing growth of the Internet, the explosion of attacks and viruses significantly affects the network security. Network Intrusion Detection System (NIDS) is develop...