Sciweavers

4636 search results - page 379 / 928
» Modelling and Validation with VipTool
Sort
View
IPPS
2007
IEEE
15 years 11 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
KBSE
2007
IEEE
15 years 11 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
GPCE
2007
Springer
15 years 10 months ago
42: programmable models of computation for a component-based approach to heterogeneous embedded systems
Every notion of a component for the development of embedded systems has to take heterogeneity into account: components may be hardware or software or OS, synchronous or asynchrono...
Florence Maraninchi, Tayeb Bouhadiba
DATE
2006
IEEE
126views Hardware» more  DATE 2006»
15 years 10 months ago
Analysis and modeling of power grid transmission lines
Power distribution and signal transmission are becoming key limiters for chip performance in nanometer era. These issues can be simultaneously addressed by designing transmission ...
J. Balachandran, Steven Brebels, G. Carchon, T. We...
IPPS
2006
IEEE
15 years 10 months ago
Modeling malware propagation in Gnutella type peer-to-peer networks
A key emerging and popular communication paradigm, primarily employed for information dissemination, is peer-to-peer (P2P) networking. In this paper, we model the spread of malwar...
Krishna K. Ramachandran, Biplab Sikdar