Sciweavers

1028 search results - page 7 / 206
» Using Attack Graphs to Design Systems
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 10 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
GECCO
2005
Springer
146views Optimization» more  GECCO 2005»
14 years 3 months ago
Design of air pump system using bond graph and genetic programming method
Kisung Seo, Erik D. Goodman, Ronald C. Rosenberg
PERCOM
2005
ACM
14 years 9 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
WWW
2011
ACM
13 years 4 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
CCS
2011
ACM
12 years 9 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...