Sciweavers

1028 search results - page 15 / 206
» Using Attack Graphs to Design Systems
Sort
View
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
14 years 1 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
14 years 4 months ago
Adaptive Systems Require Adaptive Support--When Tools Attack!
In a world where intelligence can be arguably measured by an animal’s ability to use tools, are we marking ourselves for natural selection? Software development tools are steadi...
Jennifer Baldwin, Yvonne Coady
STOC
1998
ACM
139views Algorithms» more  STOC 1998»
14 years 2 months ago
Analysis of Low Density Codes and Improved Designs Using Irregular Graphs
In [6], Gallager introduces a family of codes based on sparse bipartite graphs, which he calls low-density parity-check codes. He suggests a natural decoding algorithm for these c...
Michael Luby, Michael Mitzenmacher, Mohammad Amin ...
ATAL
2003
Springer
14 years 3 months ago
A prototype multiAgent network security system
Distributed Internet-based attacks on computer systems are becoming more prevalent. These attacks usually employ some form of automation and involve the compromise of many systems...
Taraka Pedireddy, José M. Vidal
ITCC
2005
IEEE
14 years 3 months ago
A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks
This paper presents a high performance and scalable elliptic curve processor which is designed to be resistant against timing attacks. The point multiplication algorithm (double-a...
Alireza Hodjat, David Hwang, Ingrid Verbauwhede