Sciweavers

1028 search results - page 82 / 103
» Using Attack Graphs to Design Systems
Sort
View
101 views 82 votes 16 years 2 months ago  DAC 2002»
Constraint-driven Communication Synthesis enables the automatic design of the communication architecture of a complex system from a library of pre-defined Intellectual Property (I...
137 views 115 votes 15 years 7 months ago  SIGIR 2009»
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
154 views 159 votes 15 years 7 months ago  INFOCOM 2007»
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
144 views 129 votes 15 years 1 months ago  CORR 2010»
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
226 views 148 votes 13 years 3 months ago  KDD 2012»
We present TOURVIZ, a system that helps its users to interactively visualize and make sense in large network datasets. In particular, it takes as input a set of nodes the user spe...
217 views 103 votes 14 years 11 months ago  ACSAC 2010»
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
89 views 96 votes 15 years 5 months ago  CCS 1993»
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
196 views 148 votes 15 years 2 months ago  I3E 2001»
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
114 views 121 votes 15 years 6 months ago  ICCBR 2003»
CBR applications running in real domains can easily reach thousands of cases, which are stored in the case library. Retrieval times can increase greatly if the retrieval algorithm ...
235 views 111 votes 15 years 8 months ago  SAC 2010»
This paper presents the Referrer Graph (RG) web prediction algorithm as a low-cost solution to predict next web user accesses. RG is aimed at being used in a real web system with ...