Sciweavers

1028 search results - page 13 / 206
» Using Attack Graphs to Design Systems
Sort
View
JNW
2008
118views more  JNW 2008»
13 years 8 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
CCS
2008
ACM
13 years 12 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
DRM
2004
Springer
14 years 3 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
PRICAI
2004
Springer
14 years 3 months ago
Creative 3D Designs Using Interactive Genetic Algorithm with Structured Directed Graph
We propose a methodology for representing artificial creatures like 3D flowers. Directed graph and Lindenmayer system (L-system) are commonly involved in AI-based creativity resear...
Hyeun-Jeong Min, Sung-Bae Cho
ALIFE
2004
13 years 9 months ago
Self-Protection and Diversity in Self-Replicating Cellular Automata
The concept of "self-protection", a capability of an organism to protect itself from exogenous attacks, is introduced to the design of artificial evolutionary systems as...
Hiroki Sayama