Sciweavers

1028 search results - page 81 / 103
» Using Attack Graphs to Design Systems
Sort
View
162 views 111 votes 15 years 3 months ago  PODC 2010»
The study of complex networks led to the belief that the connectivity of network nodes generally follows a Power-law distribution. In this work, we show that modeling large-scale ...
105 views 102 votes 15 years 7 months ago  IWSEC 2009»
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
144 views 87 votes 15 years 7 months ago  SP 2008»
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
100 views 120 votes 15 years 1 months ago  TOG 2008»
This paper addresses the problem of interactively modeling large street networks. We introduce a modeling framework that uses tensor fields to guide the generation of a street gra...
133 views 93 votes 15 years 6 months ago  ATAL 2005»
The PartNET++ system is an experimental multi-agent-based simulation tool that uses a new model based on hyper-graphs for understanding partnership formation among heterogeneous a...
101 views 82 votes 16 years 2 months ago  DAC 2002»
Constraint-driven Communication Synthesis enables the automatic design of the communication architecture of a complex system from a library of pre-defined Intellectual Property (I...
137 views 115 votes 15 years 7 months ago  SIGIR 2009»
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
154 views 159 votes 15 years 7 months ago  INFOCOM 2007»
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
144 views 129 votes 15 years 1 months ago  CORR 2010»
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
226 views 148 votes 13 years 3 months ago  KDD 2012»
We present TOURVIZ, a system that helps its users to interactively visualize and make sense in large network datasets. In particular, it takes as input a set of nodes the user spe...