Sciweavers

562 search results - page 59 / 113
» Attack graph generation and analysis
Sort
View
128
Voted
EUROSYS
2008
ACM
16 years 19 days ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
103
Voted
IPPS
2000
IEEE
15 years 8 months ago
Optimization of Motion Estimator for Run-Time-Reconfiguration Implementation
In this paper, we present a method to estimate the number of reconfiguration steps that a time-constrained algorithm can accommodate. This analysis demonstrates how one would attac...
Camel Tanougast, Yves Berviller, Serge Weber
139
Voted
IPPS
1996
IEEE
15 years 7 months ago
Commutativity Analysis: A Technique for Automatically Parallelizing Pointer-Based Computations
This paper introduces an analysis technique, commutativity analysis, for automatically parallelizing computations that manipulate dynamic, pointer-based data structures. Commutati...
Martin C. Rinard, Pedro C. Diniz
DSVIS
1994
Springer
15 years 7 months ago
A Model-Based Approach to Presentation: A Continuum from Task Analysis to Prototype
This paper presents a complete model-based approach to the building of presentation for a business oriented highly interactive application. This approach is considered complete in...
François Bodart, Anne-Marie Hennebert, Isab...
ISVC
2010
Springer
15 years 2 months ago
Visual Network Analysis of Dynamic Metabolic Pathways
We extend our previous work on the exploration of static metabolic networks to evolving, and therefore dynamic, pathways. We apply our visualization software to data from a simulat...
Markus Rohrschneider, Alexander Ullrich, Andreas K...