Sciweavers

2042 search results - page 305 / 409
» Modeling and Analysis of Probabilistic Timed Systems
Sort
View
EMS
2008
IEEE
13 years 11 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
CAD
2006
Springer
13 years 10 months ago
Repairing CAD model errors based on the design history
For users of CAD data, few things are as frustrating as receiving unusable, poor quality data. Users often waste time fixing or rebuilding such data from scratch on the basis of p...
Jeongsam Yang, Soonhung Han
APN
1994
Springer
14 years 2 months ago
Modelling the Work Flow of a Nuclear Waste Management Program
In this paper we describe a modelling project to improve a nuclear waste management program in charge of the creation of a new system for the permanent disposal of nuclear waste. S...
Kjeld Høyer Mortensen, Valerio O. Pinci
UAI
2000
13 years 11 months ago
Building a Stochastic Dynamic Model of Application Use
Many intelligent user interfaces employ application and user models to determine the user's preferences, goals and likely future actions. Such models require application anal...
Peter Gorniak, David Poole
DBSEC
2006
131views Database» more  DBSEC 2006»
13 years 11 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...