Sciweavers

741 search results - page 57 / 149
» Tools and techniques for Network Forensics
Sort
View
EUROPKI
2004
Springer
14 years 2 months ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith
HYBRID
2003
Springer
14 years 2 months ago
Automated Symbolic Reachability Analysis; with Application to Delta-Notch Signaling Automata
Abstract. This paper describes the implementation of predicate abstraction techniques to automatically compute symbolic backward reachable sets of high dimensional piecewise affine...
Ronojoy Ghosh, Ashish Tiwari, Claire Tomlin
WIDM
1998
ACM
14 years 1 months ago
WebML: Querying the World-Wide Web for Resources and Knowledge
There is a massive increase of information available on electronic networks. This profusion of resources on the WorldWide Web gave rise to considerable interest in the research co...
Osmar R. Zaïane, Jiawei Han
IEEEAMS
2003
IEEE
14 years 2 months ago
Building Autonomic Systems Via Configuration
Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...
MSWIM
2004
ACM
14 years 2 months ago
Scalable simulation of large-scale wireless networks with bounded inaccuracies
Discrete event network simulators have emerged as popular tools for verification and performance evaluation for various wireless networks. Nevertheless, the desire to model such ...
Zhengrong Ji, Junlan Zhou, Mineo Takai, Rajive Bag...