Sciweavers

529 search results - page 9 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
HOLOMAS
2007
Springer
14 years 2 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...
COMPSAC
2008
IEEE
14 years 2 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
SCP
2010
172views more  SCP 2010»
13 years 6 months ago
Alternating-time stream logic for multi-agent systems
Constraint automata have been introduced to provide a compositional, operational semantics for the exogenous coordination language Reo, but they can also serve interface specifica...
Sascha Klüppelholz, Christel Baier
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
14 years 1 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
ISCC
2006
IEEE
256views Communications» more  ISCC 2006»
14 years 1 months ago
A Wireless Distributed Intrusion Detection System and a New Attack Model
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...