Sciweavers

1737 search results - page 106 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ACSAC
2006
IEEE
15 years 6 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna
IPPS
2007
IEEE
15 years 6 months ago
On the Security of Ultrasound as Out-of-band Channel
Ultrasound has been proposed as out-of-band channel for authentication of peer devices in wireless ad hoc networks. Ultrasound can implicitly contribute to secure communication ba...
Rene Mayrhofer, Hans Gellersen
SOSP
2007
ACM
15 years 8 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
HASE
2007
IEEE
15 years 6 months ago
Pattern-Based Modeling and Analysis of Failsafe Fault-Tolerance in UML
In order to facilitate incremental modeling and analysis of fault-tolerant embedded systems, we introduce an object analysis pattern, called the detector pattern, that provides a ...
Ali Ebnenasir, Betty H. C. Cheng
GLOBECOM
2008
IEEE
15 years 6 months ago
Cooperative and Non-Cooperative Aloha Games with Channel Capture
—Game theory has been a useful tool for the analysis of random-access based wireless networks due to their decentralized operations. This paper studies one of the most widely use...
Younggeun Cho, Fouad A. Tobagi