Sciweavers

562 search results - page 30 / 113
» Attack graph generation and analysis
Sort
View
CCS
2009
ACM
14 years 2 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
KDD
2009
ACM
200views Data Mining» more  KDD 2009»
14 years 2 months ago
Visual analysis of documents with semantic graphs
In this paper, we present a technique for visual analysis of documents based on the semantic representation of text in the form of a directed graph, referred to as semantic graph....
Delia Rusu, Blaz Fortuna, Dunja Mladenic, Marko Gr...
CSFW
2002
IEEE
14 years 19 days ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
CAAN
2004
Springer
14 years 1 months ago
Limits and Power Laws of Models for the Web Graph and Other Networked Information Spaces
We consider a generalized copy model of the web graph and related networks, and analyze its limiting behaviour. The model is motivated by previously proposed copying models of the ...
Anthony Bonato, Jeannette C. M. Janssen
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
13 years 12 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares