Sciweavers

562 search results - page 31 / 113
» Attack graph generation and analysis
Sort
View
DLIB
2002
263views more  DLIB 2002»
13 years 7 months ago
Information Retrieval by Semantic Analysis and Visualization of the Concept Space of D-Lib Magazine
In this article we present a method for retrieving documents from a digital library through a visual interface based on automatically generated concepts. We used a vocabulary gene...
Junliang Zhang, Javed Mostafa, Himansu Tripathy
ACSAC
2005
IEEE
14 years 1 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
INFOCOM
2008
IEEE
14 years 2 months ago
Modeling the Evolution of Degree Correlation in Scale-Free Topology Generators
—In this paper, we examine the asymptotic behavior of degree correlation (i.e., the joint degree distribution of adjacent nodes) in several scale-free topology generators GED [13...
Xiaoming Wang, Xiliang Liu, Dmitri Loguinov
ICDCSW
2011
IEEE
12 years 7 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
IV
2010
IEEE
166views Visualization» more  IV 2010»
13 years 5 months ago
From Databases to Graph Visualization
The first step of any information visualization system is to enable end user to import their dataset into the system. However, non expert user are faced to the difficult task of ch...
Frédéric Gilbert, David Auber