Sciweavers

1028 search results - page 64 / 103
» Using Attack Graphs to Design Systems
Sort
View
146 views 131 votes 15 years 7 months ago  ICCS 2004»
The Knowledge Agent Mediation Language (KNAML) is designed for use in multi-agent reasoning systems. Like conceptual graphs, KNAML represents knowledge using concepts, relations, a...
244 views 141 votes 16 years 2 months ago  KDD 2007»
In this paper, we design recommender systems for weblogs based on the link structure among them. We propose algorithms based on refined random walks and spectral methods. First, w...
190 views 143 votes 14 years 11 months ago  CCS 2010»
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
88 views 95 votes 15 years 8 months ago  KIVS 2007»
Today, the Internet is used by companies frequently since it simplifies daily work, speeds up communication, and saves money. But the more popular the Internet gets the more it su...
153 views 118 votes 15 years 8 months ago  IPPS 2007»
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
133 views 126 votes 15 years 3 months ago  ACSW 2006»
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
124 views 111 votes 15 years 11 months ago  EUROSYS 2008»
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
106 views 129 votes 15 years 2 months ago  ENTCS 2008»
In model-based software development, a complete design and analysis process involves designing the system using the design language, converting it into the analysis language, and ...
209 views 107 votes 15 years 7 months ago  ISMVL 2010»
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
147 views 157 votes 15 years 2 months ago  TVCG 2008»
Systems biologists use interaction graphs to model the behavior of biological systems at the molecular level. In an iterative process, such biologists observe the reactions of livi...