Sciweavers

562 search results - page 29 / 113
» Attack graph generation and analysis
Sort
View
CPC
2007
125views more  CPC 2007»
13 years 7 months ago
Adversarial Deletion in a Scale-Free Random Graph Process
We study a dynamically evolving random graph which adds vertices and edges using preferential attachment and is “attacked by an adversary”. At time t, we add a new vertex xt a...
Abraham D. Flaxman, Alan M. Frieze, Juan Vera
UAI
1996
13 years 9 months ago
A Graph-Theoretic Analysis of Information Value
We derive qualitative relationships about the informationalrelevance of variables in graphical decision models based on a consideration of the topology of the models. Speci cally,...
Kim-Leng Poh, Eric Horvitz
ESEC
1995
Springer
13 years 11 months ago
An Exploratory Study of Program Metrics as Predictors of Reachability Analysis Performance
This paper presents the results of an exploratory experiment investigating the use of program metrics to predict reachability graph size, reachability graph generation time, and d...
A. T. Chamillard
SEC
2008
13 years 9 months ago
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs
Design diversity is a well-known method to ensure fault tolerance. Such a method has also been applied successfully in various projects to provide intrusion detection and tolerance...
Frédéric Majorczyk, Eric Totel, Ludo...
CAPTECH
1998
Springer
13 years 12 months ago
3D Part Recognition Method for Human Motion Analysis
A method for matching sequences from two perspective views of a moving person silhouette is presented. Regular (approximate uniform thickness) parts are detected on an image and a ...
Carlos Yániz, Jairo Rocha, Francisco J. Per...