Sciweavers

362 search results - page 41 / 73
» Extending the Resynchronization Attack
Sort
View
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
15 years 8 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
112
Voted
ICICS
2005
Springer
15 years 8 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
112
Voted
ACSAC
2002
IEEE
15 years 7 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
RAID
2001
Springer
15 years 7 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
114
Voted
HICSS
2009
IEEE
128views Biometrics» more  HICSS 2009»
15 years 6 months ago
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This...
Teodor Sommestad, Mathias Ekstedt, Pontus Johnson