Sciweavers

4052 search results - page 70 / 811
» Using RDF to describe networks
Sort
View
80
Voted
ACSAC
2009
IEEE
15 years 7 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
79
Voted
CIARP
2005
Springer
15 years 6 months ago
Non-supervised Classification of 2D Color Images Using Kohonen Networks and a Novel Metric
We describe the application of 1-Dimensional Kohonen Networks in the classification of color 2D images which has been evaluated in Popocatépetl Volcano’s images. The Popocatépe...
Ricardo Pérez-Aguila, Pilar Gómez-Gi...
HOTNETS
2010
14 years 7 months ago
Using strongly typed networking to architect for tussle
Today's networks discriminate towards or against traffic for a wide range of reasons, and in response end users and their applications increasingly attempt to evade monitorin...
Chitra Muthukrishnan, Vern Paxson, Mark Allman, Ad...
90
Voted
PERCOM
2006
ACM
16 years 8 days ago
Electronic Prescriptions: A Ubiquitous Solution using Jini
Ubiquitous computing has thus far not touched the realm of electronic prescriptions. This paper describes a Jini-based solution for electronic prescriptions, which allows for thei...
Gheorghita Ghinea, Arash Moradi, Shervin Asgari, T...
70
Voted
AIMS
2007
Springer
15 years 6 months ago
Understanding Promise Theory Using Rewriting Logic
We describe our effort to evaluate the syntax and constraints of Promise Theory using a tool developed in the Maude framework. Through the development of a Maude module we are able...
Kyrre M. Begnum, Mark Burgess