Sciweavers

214 search results - page 20 / 43
» Measuring Security Risk of Networks Using Attack Graphs
Sort
View
DATE
2009
IEEE
189views Hardware» more  DATE 2009»
14 years 2 months ago
CUFFS: An instruction count based architectural framework for security of MPSoCs
—Multiprocessor System on Chip (MPSoC) architecture is rapidly gaining momentum for modern embedded devices. The vulnerabilities in software on MPSoCs are often exploited to caus...
Krutartha Patel, Sri Parameswaran, Roshan G. Ragel
IFIP
2007
Springer
14 years 1 months ago
Securing Current and Future Process Control Systems
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodit...
Robert K. Cunningham, Steven Cheung, Martin W. Fon...
EUROISI
2008
13 years 9 months ago
Locating Key Actors in Social Networks Using Bayes' Posterior Probability Framework
Abstract. Typical analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long history of their successful use. ...
Dil Muhammad Akbar Hussain, Daniel Ortiz Arroyo
SIGCOMM
1998
ACM
13 years 12 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
ACSAC
2005
IEEE
14 years 1 months ago
Building Evidence Graphs for Network Forensics Analysis
In this paper, we present techniques for a network forensics analysis mechanism that includes effective evidence presentation, manipulation and automated reasoning. We propose the...
Wei Wang, Thomas E. Daniels