Sciweavers

1028 search results - page 67 / 103
» Using Attack Graphs to Design Systems
Sort
View
147 views 101 votes 15 years 7 months ago  ICDE 2005»
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
126 views 111 votes 15 years 7 months ago  IPPS 2007»
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
140 views 103 votes 15 years 6 months ago  AINA 2010»
Abstract—A geolocalised system generally belongs to an individual and as such knowing its location reveals the location of its owner, which is a direct threat against his privacy...
123 views 110 votes 15 years 1 months ago  FUIN 2007»
Abstract. Approximate Petri nets (AP-nets) can be used for the knowledge representation and approximate reasoning. The AP-net model is defined on the basis of the rough set approa...
166 views 125 votes 15 years 25 days ago  ESWA 2008»
The severe competition in the market has driven enterprises to produce a wider variety of products to meet consumers' needs. However, frequent variation of product specificat...
136 views 125 votes 15 years 7 months ago  VOTEID 2007»
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
255 views 108 votes 15 years 6 months ago  SIGMOD 2010»
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
166 views 95 votes 15 years 8 months ago  EDBTW 2010»
Graph composition has applications in a variety of practical applications. In drug development, for instance, in order to understand possible drug interactions, one has to merge k...
213 views 127 votes 14 years 11 months ago  IMC 2010»
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networ...
139 views 117 votes 15 years 6 months ago  PDCAT 2005»
Recently a bulk of research [14, 5, 15, 9] has been done on the modelling of the smallworld phenomenon, which has been shown to be pervasive in social and nature networks, and eng...