Sciweavers

211 search results - page 22 / 43
» Modeling security as a dependability attribute: a refinement...
Sort
View
DISCEX
2003
IEEE
15 years 9 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 11 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
CCS
2008
ACM
15 years 6 months ago
A general model of probabilistic packet marking for IP traceback
In this paper, we model Probabilistic Packet Marking (PPM) schemes for IP traceback as an identification problem of a large number of markers. Each potential marker is associated ...
Liming Lu, Mun Choon Chan, Ee-Chien Chang
CCS
2007
ACM
15 years 10 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
EOR
2008
95views more  EOR 2008»
15 years 4 months ago
Enabling e-transactions with multi-attribute preference models
This paper describes potential applications of multi-attribute preference models (MAPM) in e-commerce and offers some guidelines for their implementation. MAPM are methodologies f...
John C. Butler, James S. Dyer, Jianmin Jia, Kerem ...