Sciweavers

1028 search results - page 8 / 103
» Using Attack Graphs to Design Systems
Sort
View
272 views 141 votes 14 years 8 months ago  CDC 2010»
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
298 views 117 votes 13 years 3 months ago  ESORICS 2012»
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
129 views 106 votes 15 years 4 months ago  ICALP 2000»
Graph processes are used in order to formalize the relation between global requirement specifications of multi-agent systems by means of message sequence charts, and implementatio...
126 views 104 votes 15 years 7 months ago  CNSR 2008»
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
121 views 108 votes 15 years 7 months ago  DEXAW 2008»
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
122 views 112 votes 15 years 5 months ago  ESSOS 2009»
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
170 views 105 votes 16 years 1 months ago  KDD 2006»
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
151 views 110 votes 15 years 6 months ago  ICICS 2005»
This paper presents PCAV (Parallel Coordinates Attack Visualizer), a real-time visualization system for detecting large-scale Internet attacks including Internet worms, DDoS attack...
166 views 108 votes 15 years 3 months ago  CCS 2008»
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
145 views 133 votes 15 years 7 months ago  INFOCOM 2007»
—One key adaptation mechanism often deployed in networking and computing systems is dynamic load balancing. The goal from employing dynamic load balancers is to ensure that the o...