Sciweavers

1028 search results - page 64 / 103
» Using Attack Graphs to Design Systems
Sort
View
146 views 122 votes 15 years 6 months ago  ICCS 2004»
The Knowledge Agent Mediation Language (KNAML) is designed for use in multi-agent reasoning systems. Like conceptual graphs, KNAML represents knowledge using concepts, relations, a...
244 views 133 votes 16 years 1 months ago  KDD 2007»
In this paper, we design recommender systems for weblogs based on the link structure among them. We propose algorithms based on refined random walks and spectral methods. First, w...
190 views 131 votes 14 years 10 months ago  CCS 2010»
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
88 views 86 votes 15 years 7 months ago  KIVS 2007»
Today, the Internet is used by companies frequently since it simplifies daily work, speeds up communication, and saves money. But the more popular the Internet gets the more it su...
153 views 104 votes 15 years 7 months ago  IPPS 2007»
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
133 views 112 votes 15 years 2 months ago  ACSW 2006»
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
124 views 105 votes 15 years 10 months ago  EUROSYS 2008»
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
106 views 119 votes 15 years 1 months ago  ENTCS 2008»
In model-based software development, a complete design and analysis process involves designing the system using the design language, converting it into the analysis language, and ...
209 views 96 votes 15 years 6 months ago  ISMVL 2010»
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
147 views 141 votes 15 years 1 months ago  TVCG 2008»
Systems biologists use interaction graphs to model the behavior of biological systems at the molecular level. In an iterative process, such biologists observe the reactions of livi...