Sciweavers

3451 search results - page 77 / 691
» Collaborative attack modeling
Sort
View
AIED
2007
Springer
14 years 1 months ago
Evaluating a Collaborative Constraint-based Tutor for UML Class Diagrams
COLLECT-UML is a collaborative constraint-based tutor for teaching object-oriented analysis and design using Unified Modelling Language. It is the first system in the family of con...
Nilufar Baghaei, Antonija Mitrovic
OOPSLA
2007
Springer
14 years 3 months ago
A framework for distributed collaborative conceptual model development
One of the major concerns in the processes which involve human analysts is the existence of uncertainty/inconsistency. In this paper, we propose a model based on belief theory tha...
Ebrahim Bagheri, Ali A. Ghorbani
CCS
2007
ACM
14 years 3 months ago
Analyzing the vulnerability of superpeer networks against attack
In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...
CSFW
2010
IEEE
14 years 29 days ago
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
—We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art...
Boris Köpf, Geoffrey Smith
ETRICS
2006
14 years 22 days ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...