Sciweavers

674 search results - page 79 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
WORM
2004
13 years 11 months ago
Preliminary results using scale-down to explore worm dynamics
A major challenge when attempting to analyze and model large-scale Internet phenomena such as the dynamics of global worm propagation is finding ate abstractions that allow us to ...
Nicholas Weaver, Ihab Hamadeh, George Kesidis, Ver...
MMB
2010
Springer
180views Communications» more  MMB 2010»
14 years 7 days ago
ResiLyzer: A Tool for Resilience Analysis in Packet-Switched Communication Networks
We present a tool for the analysis of fault-tolerance in packet-switched communication networks. Network elements like links or routers can fail or unexpected traffic surges may o...
David Hock, Michael Menth, Matthias Hartmann, Chri...
CTRSA
2003
Springer
96views Cryptology» more  CTRSA 2003»
14 years 3 months ago
Hardware Performance Characterization of Block Cipher Structures
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) ma...
Lu Xiao, Howard M. Heys
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 7 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
ICRA
2002
IEEE
83views Robotics» more  ICRA 2002»
14 years 3 months ago
Impulse Measure Based Performance Analysis of Sawing Task by Dual Arm
- Some of manufacturing tasks such as sawing task often requires continuous impulsive motion. In case of sawing task, such impulsive motions can be observed between the teeth of th...
Jae Hoon Lee, Byung-Ju Yi, Sang-Rok Oh, Il Hong Su...