Sciweavers

1028 search results - page 67 / 206
» Using Attack Graphs to Design Systems
Sort
View
ICDE
2005
IEEE
147views Database» more  ICDE 2005»
14 years 4 months ago
Advanced Indexing Techniques for Wide-Area Network Monitoring
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...
IPPS
2007
IEEE
14 years 4 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
AINA
2010
IEEE
14 years 3 months ago
GEPETO: A GEoPrivacy-Enhancing TOolkit
Abstract—A geolocalised system generally belongs to an individual and as such knowing its location reveals the location of its owner, which is a direct threat against his privacy...
Sébastien Gambs, Marc-Olivier Killijian, Mi...
FUIN
2007
123views more  FUIN 2007»
13 years 10 months ago
Analysis of Approximate Petri Nets by Means of Occurrence Graphs
Abstract. Approximate Petri nets (AP-nets) can be used for the knowledge representation and approximate reasoning. The AP-net model is defined on the basis of the rough set approa...
Zbigniew Suraj, Barbara Fryc
ESWA
2008
166views more  ESWA 2008»
13 years 10 months ago
Modular design to support green life-cycle engineering
The severe competition in the market has driven enterprises to produce a wider variety of products to meet consumers' needs. However, frequent variation of product specificat...
Hwai-En Tseng, Chien-Chen Chang, Jia-Diann Li