Sciweavers

1028 search results - page 53 / 206
» Using Attack Graphs to Design Systems
Sort
View
JSA
1998
72views more  JSA 1998»
13 years 10 months ago
Network conscious design of distributed real-time systems
In this paper, we present a network conscious approach to designing distributed real-time systems. Given a task graph design of the system, the end-to-end constraints on the input...
Jung Woo Park, Young Shin Kim, Seongsoo Hong, Mana...
FPGA
1998
ACM
142views FPGA» more  FPGA 1998»
14 years 2 months ago
A Hybrid Complete-Graph Partial-Crossbar Routing Architecture for Multi-FPGA Systems
Multi-FPGA systems (MFSs) are used as custom computing machines, logic emulators and rapid prototyping vehicles. A key aspect of these systems is their programmable routing archit...
Mohammed A. S. Khalid, Jonathan Rose
JNW
2006
142views more  JNW 2006»
13 years 10 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
IPCCC
2006
IEEE
14 years 4 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
COMPSAC
2008
IEEE
14 years 4 months ago
Framework for Computer-Aided Evolution of Object-Oriented Designs
In this paper, we describe a framework for the computeraided evolution of the designs of object-oriented software systems. Evolution mechanisms are software structures that prepar...
Selim Ciraci, Pim van den Broek, Mehmet Aksit