Sciweavers

1028 search results - page 83 / 103
» Using Attack Graphs to Design Systems
Sort
View
217 views 103 votes 14 years 11 months ago  ACSAC 2010»
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
89 views 96 votes 15 years 5 months ago  CCS 1993»
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
196 views 148 votes 15 years 2 months ago  I3E 2001»
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
114 views 121 votes 15 years 6 months ago  ICCBR 2003»
CBR applications running in real domains can easily reach thousands of cases, which are stored in the case library. Retrieval times can increase greatly if the retrieval algorithm ...
235 views 111 votes 15 years 8 months ago  SAC 2010»
This paper presents the Referrer Graph (RG) web prediction algorithm as a low-cost solution to predict next web user accesses. RG is aimed at being used in a real web system with ...
140 views 110 votes 15 years 6 months ago  IWIA 2005»
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
157 views 126 votes 15 years 5 months ago  SIGGRAPH 1997»
Interactive modeling of 3-D solids is an important and difficult problem in computer graphics. The Constructive Solid Geometry (CSG) modeling scheme is highly attractive for inte...
87 views 98 votes 15 years 2 months ago  ICMAS 1998»
We have been developing an approach for the distributed coordination of heterogeneous, autonomous agents. This approach takes as input (a) agent skeletons, giving compact descript...
131 views 130 votes 15 years 23 days ago  JSA 2008»
We present a framework for the formal verification of abstract state machine (ASM) designs using the multiway decision graphs (MDG) tool. ASM is a state based language for describ...
157 views 120 votes 15 years 6 months ago  CIKM 2005»
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...