Sciweavers

1028 search results - page 66 / 103
» Using Attack Graphs to Design Systems
Sort
View
110 views 111 votes 15 years 2 months ago  AVI 2006»
Our goal is to define a list of tasks for graph visualization that has enough detail and specificity to be useful to designers who want to improve their system and to evaluators w...
102 views 94 votes 15 years 6 months ago  SISW 2003»
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
136 views 117 votes 15 years 1 months ago  JNCA 2007»
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
143 views 102 votes 14 years 10 months ago  CSREASAM 2010»
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
138 views 114 votes 16 years 2 months ago  DAC 2008»
Synchronous dataflow (SDF) has been successfully used in design tools for system-level simulation of wireless communication systems. Modern wireless communication standards involv...
147 views 101 votes 15 years 7 months ago  ICDE 2005»
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
126 views 111 votes 15 years 7 months ago  IPPS 2007»
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
140 views 103 votes 15 years 6 months ago  AINA 2010»
Abstract—A geolocalised system generally belongs to an individual and as such knowing its location reveals the location of its owner, which is a direct threat against his privacy...
123 views 110 votes 15 years 1 months ago  FUIN 2007»
Abstract. Approximate Petri nets (AP-nets) can be used for the knowledge representation and approximate reasoning. The AP-net model is defined on the basis of the rough set approa...
166 views 125 votes 15 years 25 days ago  ESWA 2008»
The severe competition in the market has driven enterprises to produce a wider variety of products to meet consumers' needs. However, frequent variation of product specificat...