Sciweavers

1028 search results - page 65 / 103
» Using Attack Graphs to Design Systems
Sort
View
133 views 112 votes 15 years 2 months ago  ACSW 2006»
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
124 views 105 votes 15 years 10 months ago  EUROSYS 2008»
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
106 views 119 votes 15 years 1 months ago  ENTCS 2008»
In model-based software development, a complete design and analysis process involves designing the system using the design language, converting it into the analysis language, and ...
209 views 96 votes 15 years 6 months ago  ISMVL 2010»
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
147 views 141 votes 15 years 1 months ago  TVCG 2008»
Systems biologists use interaction graphs to model the behavior of biological systems at the molecular level. In an iterative process, such biologists observe the reactions of livi...
110 views 111 votes 15 years 2 months ago  AVI 2006»
Our goal is to define a list of tasks for graph visualization that has enough detail and specificity to be useful to designers who want to improve their system and to evaluators w...
102 views 94 votes 15 years 6 months ago  SISW 2003»
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
136 views 117 votes 15 years 1 months ago  JNCA 2007»
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
143 views 102 votes 14 years 10 months ago  CSREASAM 2010»
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
138 views 114 votes 16 years 2 months ago  DAC 2008»
Synchronous dataflow (SDF) has been successfully used in design tools for system-level simulation of wireless communication systems. Modern wireless communication standards involv...