Sciweavers

1278 search results - page 157 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
144
Voted
ANTSW
2010
Springer
15 years 1 months ago
Evaluating the Robustness of Activator-Inhibitor Models for Cluster Head Computation
Activator-inhibitor models have been widely used to explain several morphogenetic processes. They have also been used to engineer algorithms for computer graphics, distributed syst...
Lidia Yamamoto, Daniele Miorandi
127
Voted
PLDI
2004
ACM
15 years 9 months ago
Cost effective dynamic program slicing
Although dynamic program slicing was first introduced to aid in user level debugging, applications aimed at improving software quality, reliability, security, and performance hav...
Xiangyu Zhang, Rajiv Gupta
116
Voted
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
15 years 9 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
CCS
2010
ACM
15 years 10 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
154
Voted
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 7 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...