Sciweavers

3451 search results - page 44 / 691
» Collaborative attack modeling
Sort
View
IFIP
2005
Springer
14 years 2 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 3 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani
IE
2007
13 years 10 months ago
Utzon's studio as a collaborative virtual environment
In order to investigate the design of virtual place for creative collaboration, I have modeled scenes from a real place of creative collaboration – Jørn Utzon's studios, w...
Viveka Weiley
JALC
2006
61views more  JALC 2006»
13 years 9 months ago
Random Polynomial-Time Attacks and Dolev-Yao Models
In this paper we present an extension of Dolev-Yao models for security protocols with a notion of random polynomial-time (Las Vegas) computability. First we notice that Dolev-Yao ...
Mathieu Baudet
EMNLP
2008
13 years 10 months ago
Attacking Decipherment Problems Optimally with Low-Order N-gram Models
We introduce a method for solving substitution ciphers using low-order letter n-gram models. This method enforces global constraints using integer programming, and it guarantees t...
Sujith Ravi, Kevin Knight