Sciweavers

1028 search results - page 73 / 103
» Using Attack Graphs to Design Systems
Sort
View
107 views 103 votes 15 years 1 months ago  CORR 2004»
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
235 views 129 votes 15 years 7 months ago  CIKM 2009»
RDF is a data model for representing labeled directed graphs, and it is used as an important building block of semantic web. Due to its flexibility and applicability, RDF has bee...
123 views 86 votes 15 years 8 months ago  CCS 2009»
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
106 views 97 votes 15 years 1 months ago  CN 2007»
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
84 views 95 votes 15 years 5 months ago  RANDOM 1998»
Abstract. Redundancy has been utilized to achieve fault tolerant computation and to achieve reliable communication in networks of processors. These techniques can only be extended ...
110 views 105 votes 15 years 1 months ago  DSD 2010»
—The design of new embedded systems is getting more and more complex as more functionality is integrated into these systems. To deal with the design complexity, a predictable des...
118 views 111 votes 15 years 10 months ago  EUROSYS 2009»
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
175 views 131 votes 15 years 6 months ago  JCDL 2005»
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
148 views 104 votes 15 years 7 months ago  AINA 2008»
In this paper we proposed a weighted suffix tree and find out it can improve the Intrusion Detection System (IDS). We firstly focus on the analysis of computer kernel system call,...
148 views 121 votes 15 years 5 months ago  ETRICS 2006»
Recommender systems are widely used to help deal with the problem of information overload. However, recommenders raise serious privacy and security issues. The personal information...