Sciweavers

17 search results - page 2 / 4
» DENOFAS: A Vulnerability Assessment Tool
Sort
View
AAAI
2008
14 years 1 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
CSREASAM
2006
14 years 7 days ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
ICSE
2007
IEEE-ACM
14 years 11 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
ECUMN
2007
Springer
14 years 5 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
IBPRIA
2007
Springer
14 years 5 months ago
Three-Dimensional Ultrasonic Assessment of Atherosclerotic Plaques
Carotid atherosclerosis is the most common life-threatening neurological disease and therefore an accurate assessment of atheromatous plaques is clinically important. Several studi...
José Seabra, João Sanches, Luí...