Sciweavers

4052 search results - page 70 / 811
» Using RDF to describe networks
Sort
View
ACSAC
2009
IEEE
14 years 6 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
CIARP
2005
Springer
14 years 4 months ago
Non-supervised Classification of 2D Color Images Using Kohonen Networks and a Novel Metric
We describe the application of 1-Dimensional Kohonen Networks in the classification of color 2D images which has been evaluated in Popocatépetl Volcano’s images. The Popocatépe...
Ricardo Pérez-Aguila, Pilar Gómez-Gi...
HOTNETS
2010
13 years 6 months ago
Using strongly typed networking to architect for tussle
Today's networks discriminate towards or against traffic for a wide range of reasons, and in response end users and their applications increasingly attempt to evade monitorin...
Chitra Muthukrishnan, Vern Paxson, Mark Allman, Ad...
PERCOM
2006
ACM
14 years 10 months ago
Electronic Prescriptions: A Ubiquitous Solution using Jini
Ubiquitous computing has thus far not touched the realm of electronic prescriptions. This paper describes a Jini-based solution for electronic prescriptions, which allows for thei...
Gheorghita Ghinea, Arash Moradi, Shervin Asgari, T...
AIMS
2007
Springer
14 years 5 months ago
Understanding Promise Theory Using Rewriting Logic
We describe our effort to evaluate the syntax and constraints of Promise Theory using a tool developed in the Maude framework. Through the development of a Maude module we are able...
Kyrre M. Begnum, Mark Burgess