Sciweavers

562 search results - page 7 / 113
» Attack graph generation and analysis
Sort
View
DIAL
2006
IEEE
103views Image Analysis» more  DIAL 2006»
14 years 1 months ago
Multi-Queue Merging Scheme And Its Application in Arabic Script Segmentation
It is an important topic for segmentation on how to merge the over-segmented subimages of characters into integral characters. The conventional character segmentation has been mos...
Pingping Xiu, Liangrui Peng, Xiaoqing Ding
CTRSA
2005
Springer
210views Cryptology» more  CTRSA 2005»
14 years 1 months ago
Hold Your Sessions: An Attack on Java Session-Id Generation
HTTP session-id’s take an important role in almost any web site today. This paper presents a cryptanalysis of Java Servlet 128-bit session-id’s and an efficient practical predi...
Zvi Gutterman, Dahlia Malkhi
CORR
2011
Springer
200views Education» more  CORR 2011»
13 years 2 months ago
An Analysis of Optimal Link Bombs
We analyze the recent phenomenon termed a Link Bomb, and investigate the optimal attack pattern for a group of web pages attempting to link bomb a specific web page. The typical ...
Sibel Adali, Tina Liu, Malik Magdon-Ismail
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 7 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin
EOR
2006
65views more  EOR 2006»
13 years 7 months ago
Generation of assembly graphs by systematic analysis of assembly structures
: Aimed at detection of parallel assembly modes, a method for assembly graph construction is described that is based on the systematic generation and analysis of precedence relatio...
Alfred J. D. Lambert