Sciweavers

1028 search results - page 30 / 206
» Using Attack Graphs to Design Systems
Sort
View
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
CCS
2004
ACM
14 years 3 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 5 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
CDC
2008
IEEE
129views Control Systems» more  CDC 2008»
14 years 4 months ago
On the structure of graph edge designs that optimize the algebraic connectivity
— We take a structural approach to the problem of designing the edge weights in an undirected graph subject to an upper bound on their total, so as to maximize the algebraic conn...
Yan Wan, Sandip Roy, Xu Wang, Ali Saberi, Tao Yang...
AGTIVE
2003
Springer
14 years 3 months ago
On Graphs in Conceptual Engineering Design
Abstract. This paper deals with knowledge-based computer aided design. A novel method giving additional support for conceptual design is presented. In this method, a designer firs...
Janusz Szuba, Agnieszka Ozimek, Andy Schürr