نتایج جستجو برای: network vulnerability
تعداد نتایج: 710634 فیلتر نتایج به سال:
Akers et al. (Proceedings of the International Conference on Parallel Processing, 1987, pp. 393–400) proposed an interconnection topology, the star graph, as an alternative to the popular n-cube. Jwo et al. (Networks 23 (1993) 315–326) studied the alternating group graph An. Cheng et al. (Super connectivity of star graphs, alternating group graphs and split-stars, Ars Combin. 59 (2001) 107–116)...
In this paper the authors study the edge-integrity of graphs. Edge-integrity is a very useful measure of the vulnerability of a network, in particular a communication network, to disruption through the deletion of edges. A number of problems are examined, including some Nordhaus-Gaddum type results. Honest graphs, i.e. those which have the maximum possible edge-integrity, are also investigated....
The economy of China and the travel needs of its citizens depend significantly on the continuous and reliable services provided by its railway system. However, this system is subject to frequent natural hazards, such as floods, earthquakes, and debris flow. A mechanism to assess the railway system vulnerability under these hazards and the design of effective vulnerability mitigation strategies ...
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks. In order to support vulnerability assessment, with the exception of analytic methods, a suitable platform for security tests needs to be developed. In this paper we analyze the cyber security of energy management system (EMS) against data attacks. First we extend our analytic framework that character...
Vulnerability assessment is an effective security mechanism to identify vulnerabilities in systems or networks before they are exploited. However manual analysis of network testing and vulnerability assessment results is time consuming and demands expertise. This paper presents an improvement of Analia, which is a security system to process results obtained after a vulnerability assessment usin...
Enterprise Local Area Networks (ELANs) have been expanding following an increase in the number of staff which necessitates establishment of new offices. However, reliability and security of services provided by ELANs need to be ensured at all times to meet expectations of users. In this paper, the network security holes existing within the ELANs were investigated. Vulnerabilities and threats we...
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly depends on the quality of its policy (i.e., configuration). Due to the lack of tools for analyzing firewall policies, most firewalls on the Internet have been plagued with policy errors. A firewall policy error either...
User location privacy is a growing concern in cellular networks. It has been recently shown that the paging architecture in GSM networks leaks user location information. In this paper, we first prove theoretically that LTE networks also have the same vulnerability. We then propose a solution making use of a novel signal processing technique, physical layer identification. The idea is to embed u...
Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Constructive control of elections refers to attempts by an agent to, via such actions as addition/deletion/partition of candidates or voters, ensure that a given candidate wins [BTT92]. Destructive control refers to attempts by an agent to, via the same actions, preclude a given candidate’...
Iterated line digraphs arise naturally in designing fault tolerant systems. Diameter vulnerability measures the increase in diameter of a digraph when some of its vertices or arcs fail. Thus, the study of diameter vulnerability is a suitable approach to the fault tolerance of a network. In this article we present some upper bounds for diameter vulnerability of iterated line digraphs LkG. Our bo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید