Sciweavers

1028 search results - page 72 / 103
» Using Attack Graphs to Design Systems
Sort
View
130 views 120 votes 15 years 6 months ago  NOMS 2002»
We present fault localization techniques suitable for diagnosing end-to-end service problems in communication systems with complex topologies. We refine a layered system model th...
104 views 94 votes 15 years 3 months ago  USS 2008»
In light of the systemic vulnerabilities uncovered by recent reviews of deployed e-voting systems, the surest way to secure the voting process would be to scrap the existing syste...
81 views 97 votes 15 years 6 months ago  PCI 2005»
In this paper, we present the rationale and the baseline of a notation which can be used on its own or as an extension to standard UML to facilitate specification of an interactive...
116 views 117 votes 15 years 6 months ago  ISCAS 2003»
The Hamiltonian Cycle (HC) problem is an important graph problem with many applications. The general backtracking algorithm normally used for random graphs often takes far too lon...
211 views 154 votes 15 years 6 months ago  ISPA 2004»
Static DHT topologies influence important features of such DHTs such as scalability, communication load balancing, routing efficiency and fault tolerance. Nevertheless, it is co...
107 views 103 votes 15 years 1 months ago  CORR 2004»
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
235 views 129 votes 15 years 8 months ago  CIKM 2009»
RDF is a data model for representing labeled directed graphs, and it is used as an important building block of semantic web. Due to its flexibility and applicability, RDF has bee...
123 views 86 votes 15 years 8 months ago  CCS 2009»
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
106 views 97 votes 15 years 1 months ago  CN 2007»
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
84 views 95 votes 15 years 5 months ago  RANDOM 1998»
Abstract. Redundancy has been utilized to achieve fault tolerant computation and to achieve reliable communication in networks of processors. These techniques can only be extended ...