Sciweavers

1278 search results - page 198 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
HPCC
2005
Springer
14 years 2 months ago
High Performance Subgraph Mining in Molecular Compounds
Structured data represented in the form of graphs arises in several fields of the science and the growing amount of available data makes distributed graph mining techniques partic...
Giuseppe Di Fatta, Michael R. Berthold
AIMS
2011
Springer
13 years 22 days ago
Finding and Analyzing Evil Cities on the Internet
Abstract. IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocatio...
Matthijs G. T. van Polen, Giovane Cesar Moreira Mo...
GLOBECOM
2009
IEEE
14 years 3 months ago
Real-World VANET Security Protocol Performance
—Many results have been published in the literature based on performance measurements obtained from simulations of Vehicular Networks (VANETs). These simulations use as input tra...
Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 7 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
SC
2003
ACM
14 years 2 months ago
Synthesizing Realistic Computational Grids
Realistic workloads are essential in evaluating middleware for computational grids. One important component is the raw grid itself: a network topology graph annotated with the har...
Dong Lu, Peter A. Dinda