Sciweavers

1028 search results - page 8 / 206
» Using Attack Graphs to Design Systems
Sort
View
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
13 years 4 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
ESORICS
2012
Springer
12 years 6 days ago
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris S...
ICALP
2000
Springer
14 years 1 months ago
Formalizing the Development of Agent-Based Systems Using Graph Processes
Graph processes are used in order to formalize the relation between global requirement specifications of multi-agent systems by means of message sequence charts, and implementatio...
Ralph Depke, Reiko Heckel
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
14 years 4 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
14 years 4 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas