Sciweavers

495 search results - page 74 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
CNSR
2007
IEEE
122views Communications» more  CNSR 2007»
14 years 4 months ago
Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology
Critical infrastructure systems are complex networks of adaptive socio-technical systems that provide the most fundamental requirements of the society. Their importance in the smo...
Ebrahim Bagheri, Ali A. Ghorbani
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
14 years 4 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
ACSAC
2004
IEEE
14 years 1 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
INFOCOM
2007
IEEE
14 years 4 months ago
Connectivity-Aware Routing (CAR) in Vehicular Ad-hoc Networks
— Vehicular ad hoc networks using WLAN technology have recently received considerable attention. We present a position-based routing scheme called Connectivity-Aware Routing (CAR...
Valery Naumov, Thomas R. Gross
EKAW
2004
Springer
14 years 3 months ago
OntoWeaver-S: Supporting the Design of Knowledge Portals
This paper presents OntoWeaver-S, an ontology-based infrastructure for building knowledge portals. In particular, OntoWeaver-S is integrated with a comprehensive web service platfo...
Yuangui Lei, Enrico Motta, John Domingue