Attack tree

Results: 40



#Item
11Public-key cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash function / Hash tree / Collision attack / RSA / MD5 / Cryptography / Hashing / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:38:04
12Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security

2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2015-03-18 10:54:32
13Chord / Distributed hash table / Internet / Peer-to-peer / Sybil attack / Routing table / Routing / Tree / Kademlia / Distributed data storage / Computing / Network architecture

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRSeptember 24, 2009

Add to Reading List

Source URL: dspace.mit.edu

Language: English - Date: 2009-09-29 02:01:46
14Security / Threat / Recreational Software Advisory Council / Attack tree / Computer network security / Computer security / Cyberwarfare

SESSION ID: ANF-F03 Achieving Defendable Architectures via Threat-Driven Methodologies Michael Muckin

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-04-28 14:34:47
15Chord / Peer-to-peer / Tree / Sybil attack / Kademlia / BATON Overlay / Distributed data storage / Computing / Distributed hash table

Sybil-resistant DHT routing George Danezis1 , Chris Lesniewski-Laas2, M. Frans Kaashoek2 , and Ross Anderson1 1 2

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:16
16Computer network security / Radio-frequency identification / Attribute grammar / Computer programming / Attribute / B-tree / Computing / Software engineering / Attack tree

Attribute Decoration of Attack–Defense Trees Alessandra Bagnato1 , Barbara Kordy2 , Per Håkon Meland3 , Patrick Schweitzer2 1 TXT e-solutions

Add to Reading List

Source URL: satoss.uni.lu

Language: English - Date: 2014-09-17 09:23:54
17Combinatorics / Attack tree / Multiset / GSM / Attribute grammar / Flow network / Mathematics / Graph theory / Computer network security

Analyzing the Security in the GSM Radio Network using Attack Jungles Parosh Aziz Abdulla1 , Jonathan Cederberg1 , and Lisa Kaati2? 1 University of Uppsala, Sweden, email: {parosh, jonathan.cederberg}@it.uu.se

Add to Reading List

Source URL: user.it.uu.se

Language: English - Date: 2011-10-12 02:21:46
18Network theory / Hacking / Software testing / Vulnerability / Induced path / Graph / Tree / Shortest path problem / Graph theory / Mathematics / Theoretical computer science

Determining the Probability of Smart Grid Attacks by ∗ Combining Attack Tree and Attack Graph Analysis Kristian Beckers1 , Maritta Heisel1 , Leanid Krautsevich2 , Fabio Martinelli2 , Rene Meis1 , and Artsiom Yautsiukhi

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2015-04-02 07:11:50
19Elm / Coccinellidae / Birch leafminer / Odontotaenius disjunctus / Phyla / Protostome / Beetle

LeastLeast-toxic Control of Elm Leaf Beetles Elm leaf beetles attack all species of elm, but prefer English and American Elms. These beetles feed on tree leaves, mainly causing aesthetic damage. However, this does stress

Add to Reading List

Source URL: www.beyondpesticides.org

Language: English - Date: 2012-09-07 11:04:53
20OSI protocols / Cyberwarfare / Network topology / Denial-of-service attacks / Ethernet / Spanning Tree Protocol / Virtual LAN / Denial-of-service attack / Data link layer / Computing / Network architecture / Computer network security

Attacks at the Data Link Layer By GUILLERMO MARIO MARRO Electronic Engineer (Universidad Nacional de Rosario[removed]THESIS Submitted in partial satisfaction of the requirements for the degree of

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:50:00
UPDATE