Sciweavers

1028 search results - page 74 / 103
» Using Attack Graphs to Design Systems
Sort
View
110 views 105 votes 15 years 1 months ago  DSD 2010»
—The design of new embedded systems is getting more and more complex as more functionality is integrated into these systems. To deal with the design complexity, a predictable des...
118 views 111 votes 15 years 10 months ago  EUROSYS 2009»
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
175 views 131 votes 15 years 6 months ago  JCDL 2005»
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
148 views 104 votes 15 years 7 months ago  AINA 2008»
In this paper we proposed a weighted suffix tree and find out it can improve the Intrusion Detection System (IDS). We firstly focus on the analysis of computer kernel system call,...
148 views 121 votes 15 years 5 months ago  ETRICS 2006»
Recommender systems are widely used to help deal with the problem of information overload. However, recommenders raise serious privacy and security issues. The personal information...
129 views 111 votes 15 years 7 months ago  POLICY 2009»
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
108 views 101 votes 16 years 2 months ago  WWW 2005»
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
173 views 122 votes 15 years 6 months ago  ICDM 2002»
In this paper, we present a new system, called GeneScout, for predicting gene structures in vertebrate genomic DNA. The system contains specially designed hidden Markov models (HM...
120 views 102 votes 15 years 6 months ago  ICICS 2005»
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
120 views 121 votes 15 years 5 months ago  METRICS 1999»
The design of software is often depicted by graphs that show components and their relationships. For example, a structure chart shows the calling relationships among components. O...