Sciweavers

1278 search results - page 235 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
VL
2008
IEEE
133views Visual Languages» more  VL 2008»
14 years 2 months ago
Analyzing a socio-technical visualization tool using usability inspection methods
Ariadne is a novel visualization tool that allows end users to explore the socio-technical relationships in software development projects. Essentially the visualization is a varia...
Erik Trainer, Stephen Quirk, Cleidson R. B. de Sou...
LCN
2005
IEEE
14 years 1 months ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...
JSAC
2011
142views more  JSAC 2011»
13 years 2 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
KBSE
1995
IEEE
13 years 11 months ago
A Transformation System for Interactive Reformulation of Design Optimization Strategies
Numerical design optimization algorithms are highly sensitive to the particular formulation of the optimization problems they are given. The formulation of the search space, the o...
Thomas Ellman, John Keane, Takahiro Murata, Mark S...
WISEC
2010
ACM
14 years 19 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt