Sciweavers

1318 search results - page 122 / 264
» Measuring network security using dynamic bayesian network
Sort
View
CCS
2006
ACM
14 years 29 days ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...
WORM
2004
13 years 10 months ago
Preliminary results using scale-down to explore worm dynamics
A major challenge when attempting to analyze and model large-scale Internet phenomena such as the dynamics of global worm propagation is finding ate abstractions that allow us to ...
Nicholas Weaver, Ihab Hamadeh, George Kesidis, Ver...
ICWSM
2010
13 years 10 months ago
Sequential Influence Models in Social Networks
The spread of influence among individuals in a social network can be naturally modeled in a probabilistic framework, but it is challenging to reason about differences between vari...
Dan Cosley, Daniel P. Huttenlocher, Jon M. Kleinbe...
DSN
2007
IEEE
14 years 3 months ago
Robustness and Security Hardening of COTS Software Libraries
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and s...
Martin Süßkraut, Christof Fetzer
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
14 years 4 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto