Sciweavers

1028 search results - page 89 / 103
» Using Attack Graphs to Design Systems
Sort
View
160 views 120 votes 15 years 2 months ago  MEDIAFORENSICS 2010»
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
178 views 106 votes 15 years 5 months ago  SP 2010»
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
91 views 140 votes 15 years 1 months ago  CTW 2002»
ive. This characterization leads to model-based abstractions and representation design techniques as potential solutions. Many of the existing approaches to coping with data overlo...
138 views 110 votes 16 years 2 months ago  DAC 2001»
Highlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components (VCs) has received a large amount of at...
173 views 143 votes 15 years 6 months ago  SAMOS 2004»
The dataflow interchange format (DIF) is a textual language that is geared towards capturing the semantics of graphical design tools for DSP system design. A key objective of DIF i...
136 views 85 votes 15 years 6 months ago  ATAL 2003»
This paper unifies two recent strands of research in multiagent system design. One, commitments are widely recognized as capturing important aspects of interactions among agents,...
173 views 91 votes 15 years 6 months ago  HIP 2005»
Web-based services designed for human users are being abused by computer programs (bots). This real-world issue has recently generated a new research area called Human Interactive...
163 views 102 votes 15 years 6 months ago  MSWIM 2005»
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
98 views 102 votes 15 years 5 months ago  IWSSD 2000»
In this study we focus on the specification and assessment of Stochastic Petri net (SPN) models to evaluate the design of an embedded system for reliability and availability. The ...
211 views 128 votes 15 years 5 months ago  AHS 2007»
In this paper, we propose a design methodology for implementing a multimode (or multi-configuration) and multi-throughput system into a single hardware architecture. The inputs of...