نتایج جستجو برای: graph vulnerability

تعداد نتایج: 239961  

2012
Philip Chan

Apply systems engineering approaches to measure and analysis vulnerabilities of military tactical RF wireless networks. Develop smart and innovative performance matrixes through EW modeling and simulation scenarios. Systematic utilize of systems engineering approaches with RF electronic warfare modeling and simulation scenarios to support research in vulnerability analysis. RF electronic warfar...

Journal: :Chaos 2010
Paul Hines Eduardo Cotilla-Sanchez Seth Blumsack

In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in electricity infrastructure, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path lengths, connectivity loss, and blackout sizes. The first two are purely topological metrics. The blac...

2015
Shouling Ji Weiqing Li Prateek Mittal Xin Hu Raheem A. Beyah

In this paper, we analyze and systematize the state-ofthe-art graph data privacy and utility techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and open-source Secure Graph data sharing/publishing system. In SecGraph, we systematically study, implement, and evaluate 11 graph data anonymization algorithms, 19 data utility metrics, and 15 modern Structure-base...

2006
András Faragó

If the network topology is modeled by an undirected graph and we consider link failures, then a natural graph theoretic measure of vulnerability is the size of a minimum cut, that is, the minimum number of edges that have to be removed to disconnect the graph, which is called the (edge-)connectivity of the graph. This number, at the same time, is the guaranteed number of edge disjoint paths bet...

Journal: :IJCIS 2009
Karla Atkins Jiangzhuo Chen V. S. Anil Kumar Achla Marathe

We study the vulnerability of electrical networks through structural analysis from a graph theory point of view. We measure and compare several important structural properties of different electrical networks, including a real power grid and several synthetic grids, as well as other infrastructural networks. The properties we consider include the minimum dominating set size, the degree distribu...

2011
Jairo Serrano Elisa Heymann Eduardo Cesar Barton Miller

Security on Grid computing is often an afterthought. However assessing security of middleware systems is of the utmost importance because they manage critical resources owned by different organizations. To fulfill this objective we use First Principles Vulnerability Assessment (FPVA), an innovative analystic-centric (manual) methodology that goes beyond current automated vulnerability tools. FP...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید