Sciweavers

1028 search results - page 52 / 206
» Using Attack Graphs to Design Systems
Sort
View
IEEEIAS
2008
IEEE
14 years 4 months ago
Challenges for Security Typed Web Scripting Languages Design
: This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
INFOCOM
2000
IEEE
14 years 2 months ago
Transport and Application Protocol Scrubbing
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
G. Robert Malan, David Watson, Farnam Jahanian, Pa...
CORR
2007
Springer
84views Education» more  CORR 2007»
13 years 10 months ago
Undirected Graphs of Entanglement Two
Entanglement is a complexity measure of directed graphs that origins in fixed point theory. This measure has shown its use in designing efficient algorithms to verify logical prop...
Walid Belkhir, Luigi Santocanale
SIAMCOMP
2000
66views more  SIAMCOMP 2000»
13 years 10 months ago
Computations of Uniform Recurrence Equations Using Minimal Memory Size
We consider a system of uniform recurrence equations (URE) of dimension one. We show how its computation can be carried out using minimal memory size with several synchronous proc...
Bruno Gaujal, Alain Jean-Marie, Jean Mairesse
AE
2007
Springer
14 years 4 months ago
Direct and Indirect Representations for Evolutionary Design of Objects
Abstract. We follow up on the work of Ebner[1] in studying representations for evolutionary design of objects. We adopt both the method and the simulation framework, and perform mo...
Juraj Plavcan, Pavel Petrovic