Sciweavers

3451 search results - page 59 / 691
» Collaborative attack modeling
Sort
View
ISI
2008
Springer
13 years 9 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
MODELS
2007
Springer
14 years 3 months ago
Model and Formalism Driven Development of Collaborative Applications
In this position paper, we explain our approach for collaborative systems development based on a model of cooperative applications and a formalism called ORCHESTRA allowing to exp...
Bertrand T. David, René Chalon
ECSCW
1993
13 years 10 months ago
A Model for Semi-(a)Synchronous Collaborative Editing
: This paper presents a new model lor semi-synchronous collaborative editing. It fills the gap between asynchronous and synchronous editing styles. The model is based on hierarchic...
Sten Minör, Boris Magnusson
AGENTS
2000
Springer
14 years 1 months ago
An Architecture for Modeling Internet-Based Collaborative Agent Systems
Abstract. This paper describes an architecture for modeling cooperating systems of communicating agents. The authors’ goal is not that of providing a framework to implement multi...
Roberto A. Flores, Robert C. Kremer, Douglas H. No...
ASIAN
2007
Springer
128views Algorithms» more  ASIAN 2007»
14 years 3 months ago
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
Abstract. We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protoc...
Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Rii...