نتایج جستجو برای: network vulnerability

تعداد نتایج: 710634  

Journal: :Discrete Applied Mathematics 2002
Eddie Cheng Marc J. Lipman

Akers et al. (Proceedings of the International Conference on Parallel Processing, 1987, pp. 393–400) proposed an interconnection topology, the star graph, as an alternative to the popular n-cube. Jwo et al. (Networks 23 (1993) 315–326) studied the alternating group graph An. Cheng et al. (Super connectivity of star graphs, alternating group graphs and split-stars, Ars Combin. 59 (2001) 107–116)...

Journal: :Discrete Mathematics 1993
Renu C. Laskar S. Stueckle Barry L. Piazza

In this paper the authors study the edge-integrity of graphs. Edge-integrity is a very useful measure of the vulnerability of a network, in particular a communication network, to disruption through the deletion of edges. A number of problems are examined, including some Nordhaus-Gaddum type results. Honest graphs, i.e. those which have the maximum possible edge-integrity, are also investigated....

Journal: :Rel. Eng. & Sys. Safety 2015
Liu Hong Min Ouyang Srinivas Peeta Xiaozheng He Yongze Yan

The economy of China and the travel needs of its citizens depend significantly on the continuous and reliable services provided by its railway system. However, this system is subject to frequent natural hazards, such as floods, earthquakes, and debris flow. A mechanism to assess the railway system vulnerability under these hazards and the design of effective vulnerability mitigation strategies ...

Journal: :CoRR 2017
Kaikai Pan André Teixeira Claudio López Peter Palensky

It is challenging to assess the vulnerability of a cyber-physical power system to data attacks. In order to support vulnerability assessment, with the exception of analytic methods, a suitable platform for security tests needs to be developed. In this paper we analyze the cyber security of energy management system (EMS) against data attacks. First we extend our analytic framework that character...

2017

Vulnerability assessment is an effective security mechanism to identify vulnerabilities in systems or networks before they are exploited. However manual analysis of network testing and vulnerability assessment results is time consuming and demands expertise. This paper presents an improvement of Analia, which is a security system to process results obtained after a vulnerability assessment usin...

2014
Leonard L. Mutembei Aloys N. Mvuma

Enterprise Local Area Networks (ELANs) have been expanding following an increase in the number of staff which necessitates establishment of new offices. However, reliability and security of services provided by ELANs need to be ensured at all times to meet expectations of users. In this paper, the network security holes existing within the ELANs were investigated. Vulnerabilities and threats we...

2007
Alex X. Liu

Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly depends on the quality of its policy (i.e., configuration). Due to the lack of tools for analyzing firewall policies, most firewalls on the Internet have been plagued with policy errors. A firewall policy error either...

2012
Tuan Ta John S. Baras

User location privacy is a growing concern in cellular networks. It has been recently shown that the paging architecture in GSM networks leaks user location information. In this paper, we first prove theoretically that LTE networks also have the same vulnerability. We then propose a solution making use of a novel signal processing technique, physical layer identification. The idea is to embed u...

Journal: :CoRR 2008
Piotr Faliszewski Edith Hemaspaandra Lane A. Hemaspaandra Jörg Rothe

Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Constructive control of elections refers to attempts by an agent to, via such actions as addition/deletion/partition of candidates or voters, ensure that a given candidate wins [BTT92]. Destructive control refers to attempts by an agent to, via the same actions, preclude a given candidate’...

Journal: :Networks 2005
Camino Balbuena Xavier Marcote Daniela Ferrero

Iterated line digraphs arise naturally in designing fault tolerant systems. Diameter vulnerability measures the increase in diameter of a digraph when some of its vertices or arcs fail. Thus, the study of diameter vulnerability is a suitable approach to the fault tolerance of a network. In this article we present some upper bounds for diameter vulnerability of iterated line digraphs LkG. Our bo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید