Sciweavers

562 search results - page 57 / 113
» Attack graph generation and analysis
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
PET
2007
Springer
14 years 1 months ago
Anonymity in the Wild: Mixes on Unstructured Networks
Abstract. As decentralized computing scenarios get ever more popular, unstructured topologies are natural candidates to consider running mix networks upon. We consider mix network ...
Shishir Nagaraja
BIBE
2009
IEEE
210views Bioinformatics» more  BIBE 2009»
14 years 2 months ago
Analysis of Autism Prevalence and Neurotoxins Using Combinatorial Fusion and Association Rule Mining
- The increase in autism prevalence has been the motivation for much research which has produced various theories for its causation. Genetic and environmental factors have been inv...
Christina Schweikert, Yanjun Li, David Dayya, Davi...
CCS
2003
ACM
14 years 1 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce
COMPLEX
2009
Springer
13 years 11 months ago
A Comparative Analysis of Specific Spatial Network Topological Models
Creating ensembles of random but "realistic" topologies for complex systems is crucial for many tasks such as benchmark generation and algorithm analysis. In general, exp...
Jun Wang, Gregory M. Provan