Sciweavers

183 search results - page 32 / 37
» Security Analysis and Configuration of Large Networks
Sort
View
BMCBI
2005
130views more  BMCBI 2005»
13 years 7 months ago
Squid - a simple bioinformatics grid
Background: BLAST is a widely used genetic research tool for analysis of similarity between nucleotide and protein sequences. This paper presents a software application entitled &...
Paulo C. Carvalho, Rafael V. Glória, Antoni...
ACSAC
2009
IEEE
14 years 2 months ago
Analyzing and Detecting Malicious Flash Advertisements
—The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe’s Flash have been instrument...
Sean Ford, Marco Cova, Christopher Kruegel, Giovan...
INFOCOM
2003
IEEE
14 years 25 days ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
ICNP
2009
IEEE
13 years 5 months ago
End-to-End Versus Hop-by-Hop Soft State Refresh for Multi-hop Signaling Systems
Abstract--To ensure state synchronization of signalling operations, many signaling protocol designs choose to establish "soft" state that expires if it is not refreshed. ...
Xiaoming Fu, Jianhua He
VIZSEC
2007
Springer
14 years 1 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols