Sciweavers

2135 search results - page 63 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
COMPSAC
2010
IEEE
13 years 4 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
BMCBI
2006
119views more  BMCBI 2006»
13 years 8 months ago
A methodology for the structural and functional analysis of signaling and regulatory networks
Background: Structural analysis of cellular interaction networks contributes to a deeper understanding of network-wide interdependencies, causal relationships, and basic functiona...
Steffen Klamt, Julio Saez-Rodriguez, Jonathan A. L...
PDPTA
2004
13 years 9 months ago
Spores: A Push and Pull Peer-to-Peer File Sharing Approach
Spores is a push and pull peer-to-peer method of file sharing and storage, making use of publicly available space on the network. A user stores a file by pushing it to a set of pe...
Thomas E. Portegys
PDPTA
2003
13 years 9 months ago
Distributed Network Monitoring Using Mobile Agents Paradigm
Traditionally network monitoring and management has been done using predominantly centralized techniques. Mobile agents have been proposed as an alternative to this centralized app...
Farhad Kamangar, David Levine, Gergely V. Zá...
DSOM
2006
Springer
13 years 11 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...