Sciweavers

1028 search results - page 91 / 103
» Using Attack Graphs to Design Systems
Sort
View
108 views 124 votes 15 years 5 months ago  CODES 1996»
The design of multi-dimensional systems using hardware/software codesign allows a significant improvement in the development cycle. This paper presents a technique that enables a ...
110 views 96 votes 15 years 2 months ago  USS 2004»
Many host-based anomaly detection systems monitor a process ostensibly running a known program by observing the system calls the process makes. Numerous improvements to the precis...
128 views 110 votes 15 years 5 months ago  CCGRID 2006»
Our current research into programming models for parallel web services composition is targeted at providing mechanisms for obtaining higher throughput for large scale compute and ...
242 views 135 votes 15 years 8 months ago  WWW 2010»
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
170 views 151 votes 15 years 6 months ago  VISSOFT 2002»
In this paper a new approach for a metrics based software visualization is presented which supports an efficient and effective quality assessment of large object-oriented software...
103 views 121 votes 15 years 5 months ago  DSN 2007»
This paper presents the design and implementation of a real-time behavior profiling system for high-speed Internet links. The profiling system uses flow-level information from con...
201 views 122 votes 15 years 6 months ago  WOWMOM 2005»
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
131 views 119 votes 16 years 1 months ago  ICSE 2008»
Understanding the structure of large existing (and evolving) software systems is a major challenge for software engineers. In reverse engineering, we aim to compute, for a given s...
205 views 103 votes 15 years 8 months ago  CHI 2010»
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
87 views 110 votes 15 years 7 months ago  INFOCOM 2007»
— Loss networks provide a powerful tool for the analysis and design of many communication and networking systems. It is well known that a large number of loss networks have produ...