Sciweavers

3451 search results - page 41 / 691
» Collaborative attack modeling
Sort
View
CAISE
2010
Springer
13 years 9 months ago
Success Factors of e-Collaboration in Business Process Modeling
We identify the success factors of collaborative modeling of business processes by a qualitative analysis of the experiences of participants in group modeling sessions. The factors...
Peter Rittgen
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 3 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
JCSS
2008
159views more  JCSS 2008»
13 years 9 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
ISCC
2006
IEEE
256views Communications» more  ISCC 2006»
14 years 3 months ago
A Wireless Distributed Intrusion Detection System and a New Attack Model
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
SAFECOMP
2007
Springer
14 years 3 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...