Sciweavers

4330 search results - page 14 / 866
» Analyzing security architectures
Sort
View
DEDS
2008
88views more  DEDS 2008»
13 years 6 months ago
Analyzing Security Protocols Using Time-Bounded Task-PIOAs
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Mos...
COMPSEC
2007
66views more  COMPSEC 2007»
13 years 6 months ago
Measuring, analyzing and predicting security vulnerabilities in software systems
Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray
ADHOCNOW
2008
Springer
14 years 1 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
ANSS
2005
IEEE
14 years 10 days ago
An Extensible Platform for Evaluating Security Protocols
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...
CCS
2011
ACM
12 years 6 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...