Sciweavers

1028 search results - page 62 / 206
» Using Attack Graphs to Design Systems
Sort
View
USS
2008
15 years 4 months ago
Experiment Isolation in a Secure Cluster Testbed
A major class of network emulation testbeds is based on the Utah Emulab design: a local cluster of experimental nodes interconnected through Ethernet switches using VLANs. The VLA...
Kevin Lahey, Robert Braden, Keith Sklower
115
Voted
DATE
2005
IEEE
119views Hardware» more  DATE 2005»
15 years 8 months ago
Functional Validation of System Level Static Scheduling
Increase in system level modeling has given rise to a need for efficient functional validation of models above cycle accurate level. This paper presents a technique for comparing...
Samar Abdi, Daniel D. Gajski
IWDC
2004
Springer
139views Communications» more  IWDC 2004»
15 years 7 months ago
Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution
Abstract. Despite their crucial impact on the performances of p2p systems, very few is known on peers behaviors in such networks. We propose here a study of these behaviors in a ru...
Jean-Loup Guillaume, Matthieu Latapy, Stevens Le-B...
ISSRE
2008
IEEE
15 years 8 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
NDSS
2005
IEEE
15 years 7 months ago
MOVE: An End-to-End Solution to Network Denial of Service
We present a solution to the denial of service (DoS) problem that does not rely on network infrastructure support, conforming to the end-to-end (e2e) design principle. Our approac...
Angelos Stavrou, Angelos D. Keromytis, Jason Nieh,...