Sciweavers

1028 search results - page 75 / 103
» Using Attack Graphs to Design Systems
Sort
View
129 views 111 votes 15 years 7 months ago  POLICY 2009»
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
108 views 101 votes 16 years 2 months ago  WWW 2005»
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
173 views 122 votes 15 years 6 months ago  ICDM 2002»
In this paper, we present a new system, called GeneScout, for predicting gene structures in vertebrate genomic DNA. The system contains specially designed hidden Markov models (HM...
120 views 102 votes 15 years 6 months ago  ICICS 2005»
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
120 views 121 votes 15 years 5 months ago  METRICS 1999»
The design of software is often depicted by graphs that show components and their relationships. For example, a structure chart shows the calling relationships among components. O...
131 views 139 votes 15 years 7 months ago  ACISP 2006»
In this paper we are interested in algebraic immunity of several well known highly-nonlinear vectorial Boolean functions (or Sboxes), designed for block and stream ciphers. Unfortu...
184 views 102 votes 14 years 11 months ago  RAID 2010»
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
125 views 115 votes 15 years 6 months ago  ICSM 2003»
This paper is a summary of the author’s thesis that presents a model and an environment for recovering the high level design of legacy software systems based on user defined ar...
157 views 116 votes 15 years 7 months ago  ACSC 2005»
The global dynamics of automata networks (such as neural networks) are a function of their topology and the choice of automata used. Evolutionary methods can be applied to the opt...
116 views 128 votes 16 years 2 months ago  DAC 2007»
Abstract. Embedded multimedia systems often run multiple time-constrained applications simultaneously. These systems use multiprocessor systems-on-chip of which it must be guarante...