Sciweavers

1737 search results - page 166 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CORR
2008
Springer
90views Education» more  CORR 2008»
15 years 5 months ago
A computationally-efficient construction for the matrix-based key distribution in sensor network
Key pre-distribution in wireless sensor network is aimed at delivering keys to sensor networks at the low expense of computation, communication, and memory while providing a high d...
Abedelaziz Mohaisen
CIVR
2008
Springer
221views Image Analysis» more  CIVR 2008»
15 years 6 months ago
Annotation suggestion and search for personal multimedia objects on the web
The number of personal multimedia objects, such as digital photographs and videos, are exploding on the web through popular sites such as Flickr, YouTube, and FaceBook hosting bil...
Brendan Elliott, Z. Meral Özsoyoglu
143
Voted
ACSAC
2003
IEEE
15 years 10 months ago
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
ISSA
2004
15 years 6 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
SIGCOMM
2009
ACM
15 years 11 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi