Sciweavers

1737 search results - page 44 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CMS
2006
175views Communications» more  CMS 2006»
13 years 10 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
FGCN
2008
IEEE
143views Communications» more  FGCN 2008»
14 years 3 months ago
The Study of Location Strategy for Bank
In this paper, authors attempt to shed light on the factors that influence the locations of bank branches in establishing a bank’s branch network from the angle of the network a...
Jae Weon Hong, Won Eui Hong, Yoon-Sik Kwak
MOBICOM
2000
ACM
14 years 1 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson
IPCCC
2006
IEEE
14 years 3 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
NDSS
2000
IEEE
14 years 1 months ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...