Sciweavers

6300 search results - page 76 / 1260
» We have it easy, but do we have it right
Sort
View
ICICS
2005
Springer
15 years 6 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
104
Voted
CCS
2009
ACM
16 years 1 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
SMI
2005
IEEE
100views Image Analysis» more  SMI 2005»
15 years 6 months ago
Robust Particle Systems for Curvature Dependent Sampling of Implicit Surfaces
Recent research on point-based surface representations suggests that point sets may be a viable alternative to parametric surface representations in applications where the topolog...
Miriah D. Meyer, Pierre Georgel, Ross T. Whitaker
INFSOF
2007
83views more  INFSOF 2007»
15 years 1 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
SLS
2007
Springer
103views Algorithms» more  SLS 2007»
15 years 7 months ago
Designing and Tuning SLS Through Animation and Graphics: An Extended Walk-Through
Stochastic Local Search (SLS) is quite effective for a variety of Combinatorial (Optimization) Problems (COP). However, the performance of SLS depends on several factors and getti...
Steven Halim, Roland H. C. Yap