Sciweavers

1028 search results - page 62 / 206
» Using Attack Graphs to Design Systems
Sort
View
USS
2008
14 years 20 days ago
Experiment Isolation in a Secure Cluster Testbed
A major class of network emulation testbeds is based on the Utah Emulab design: a local cluster of experimental nodes interconnected through Ethernet switches using VLANs. The VLA...
Kevin Lahey, Robert Braden, Keith Sklower
DATE
2005
IEEE
119views Hardware» more  DATE 2005»
14 years 4 months ago
Functional Validation of System Level Static Scheduling
Increase in system level modeling has given rise to a need for efficient functional validation of models above cycle accurate level. This paper presents a technique for comparing...
Samar Abdi, Daniel D. Gajski
IWDC
2004
Springer
139views Communications» more  IWDC 2004»
14 years 3 months ago
Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution
Abstract. Despite their crucial impact on the performances of p2p systems, very few is known on peers behaviors in such networks. We propose here a study of these behaviors in a ru...
Jean-Loup Guillaume, Matthieu Latapy, Stevens Le-B...
ISSRE
2008
IEEE
14 years 4 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
NDSS
2005
IEEE
14 years 3 months ago
MOVE: An End-to-End Solution to Network Denial of Service
We present a solution to the denial of service (DoS) problem that does not rely on network infrastructure support, conforming to the end-to-end (e2e) design principle. Our approac...
Angelos Stavrou, Angelos D. Keromytis, Jason Nieh,...