Sciweavers

1028 search results - page 7 / 103
» Using Attack Graphs to Design Systems
Sort
View
110 views 101 votes 15 years 1 months ago  CORR 2010»
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
146 views 63 votes 15 years 6 months ago  GECCO 2005»
195 views 89 votes 16 years 25 days ago  PERCOM 2005»
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
202 views 122 votes 14 years 8 months ago  WWW 2011»
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
190 views 135 votes 14 years 1 months ago  CCS 2011»
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
272 views 141 votes 14 years 8 months ago  CDC 2010»
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
298 views 117 votes 13 years 3 months ago  ESORICS 2012»
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
129 views 106 votes 15 years 4 months ago  ICALP 2000»
Graph processes are used in order to formalize the relation between global requirement specifications of multi-agent systems by means of message sequence charts, and implementatio...
126 views 104 votes 15 years 7 months ago  CNSR 2008»
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
121 views 108 votes 15 years 7 months ago  DEXAW 2008»
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...