Sciweavers

2270 search results - page 294 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ICONFERENCE
2012
14 years 3 days ago
Rural anchor institution broadband connectivity: enablers and barriers to adoption
This paper presents findings from two research projects that entail needs assessments, benchmarking, and onsite diagnostics of anchor institutions in support of multi-million doll...
Lauren H. Mandel, Nicole D. Alemanne, Charles R. M...
CCS
2009
ACM
15 years 11 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
159
Voted
SEC
1996
15 years 5 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas
ATAL
2006
Springer
15 years 8 months ago
Enhancing agent-oriented models with aspects
The modular representation of concerns is imperative in the design modeling of multi-agent systems (MASs). However, MAS designers typically face a number of concerns that inherent...
Alessandro F. Garcia, Christina Chavez, Ricardo Ch...
149
Voted
COMCOM
2008
135views more  COMCOM 2008»
15 years 4 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan