Sciweavers

1414 search results - page 5 / 283
» Combining Intruder Theories
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 10 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 4 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
ACL
2012
12 years 6 days ago
Combining Textual Entailment and Argumentation Theory for Supporting Online Debates Interactions
Blogs and forums are widely adopted by online communities to debate about various issues. However, a user that wants to cut in on a debate may experience some difficulties in ext...
Elena Cabrio, Serena Villata
IJCV
2012
12 years 6 days ago
A Combined Theory of Defocused Illumination and Global Light Transport
Mohit Gupta, Yuandong Tian, Srinivasa G. Narasimha...
JSAC
2006
128views more  JSAC 2006»
13 years 9 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum