Sciweavers

1028 search results - page 68 / 103
» Using Attack Graphs to Design Systems
Sort
View
136 views 125 votes 15 years 7 months ago  VOTEID 2007»
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
255 views 108 votes 15 years 6 months ago  SIGMOD 2010»
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
166 views 95 votes 15 years 8 months ago  EDBTW 2010»
Graph composition has applications in a variety of practical applications. In drug development, for instance, in order to understand possible drug interactions, one has to merge k...
213 views 127 votes 14 years 11 months ago  IMC 2010»
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networ...
139 views 117 votes 15 years 6 months ago  PDCAT 2005»
Recently a bulk of research [14, 5, 15, 9] has been done on the modelling of the smallworld phenomenon, which has been shown to be pervasive in social and nature networks, and eng...
239 views 132 votes 15 years 6 months ago  HYBRID 2010»
This paper addresses the problem of self localization of mobile devices. In particular, each device combines noisy measurements of its absolute position with distance measurements...
104 views 83 votes 15 years 7 months ago  CIMCA 2006»
Abstract. We describe Scusi?, a multi-stage, spoken language interpretation mechanism designed to be part of a robot-mounted dialogue system. Scusi?’s interpretation process maps...
191 views 134 votes 14 years 1 months ago  CRYPTO 2011»
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
147 views 105 votes 15 years 1 months ago  IJSN 2008»
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
121 views 89 votes 15 years 5 months ago  DEBS 2007»
Event-driven systems are used in a wide range of applications such as responding to missile attacks, interdicting potential terrorists, exploiting arbitrage opportunities and resp...