Sciweavers

1737 search results - page 16 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 7 months ago
Topological analysis of the power grid and mitigation strategies against cascading failures
This paper presents a complex systems overview of a power grid network under cascading conditions. The cascading effect has been simulated on three different networks, the IEEE 300...
Sakshi Pahwa, Amelia Hodges, Caterina M. Scoglio, ...
DSOM
2006
Springer
13 years 11 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
ACISICIS
2007
IEEE
14 years 2 months ago
A performance analysis of page and object retrieval using HTTP-MPLEX in symmetric network environments
HTTP-MPLEX is a header compression and response encoding scheme for HTTP. It is designed to compress traditional HTTP requests and multiplex any number of responses to a single st...
Robert L. R. Mattson, Somnath Ghosh
IEICET
2008
136views more  IEICET 2008»
13 years 7 months ago
Delay Analysis of Car-to-Car Reliable Data Delivery Strategies Based on Data Mulling with Network Coding
Abstract--Vehicular ad hoc networks (VANET) aims to enhance vehicle navigation safety by providing an early warning system: any chance of accidents is informed through the wireless...
Joon-Sang Park, Uichin Lee, Soon-Young Oh, Mario G...
OOPSLA
2009
Springer
14 years 2 months ago
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations
An object diagram makes explicit the object structures that are only implicit in a class diagram. An object diagram may be missing and must extracted from the code. Alternatively,...
Marwan Abi-Antoun, Jonathan Aldrich