Sciweavers

1028 search results - page 96 / 103
» Using Attack Graphs to Design Systems
Sort
View
115 views 101 votes 15 years 7 months ago  EDOC 2007»
There has, in recent years, been growing interest in Model Driven Engineering (MDE), in which models are the primary design artifacts and transformations are applied to these mode...
112 views 112 votes 15 years 6 months ago  ICDCSW 2005»
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
717 views 148 votes 15 years 6 months ago  VIZSEC 2004»
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble k...
116 views 111 votes 15 years 5 months ago  WECWIS 1999»
In an e-commerce system, security, in particular authentication, is of paramount importance. Public-key Infrastructure is often used to enforce authentication and the property of ...
99 views 83 votes 15 years 6 months ago  IWSOC 2003»
The availability of high-level design entry tooling is crucial for the viability of any reconfigurable SoC architecture. This paper presents a template generation method to extra...
116 views 114 votes 15 years 1 months ago  CORR 2006»
We introduce a new approach to take into account the memory architecture and the memory mapping in the High- Level Synthesis of Real-Time embedded systems. We formalize the memory...
167 views 91 votes 15 years 2 months ago  GECCO 2008»
We attack the problem of game balancing by using a coevolutionary algorithm to explore the space of possible game strategies and counter strategies. We define balanced games as g...
240 views 268 votes 15 years 6 months ago  INFOCOM 2005»
Abstract— We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix,...
138 views 138 votes 15 years 5 months ago  ECBS 1999»
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
136 views 151 votes 15 years 5 months ago  CANS 2006»
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...