نتایج جستجو برای: graph vulnerability
تعداد نتایج: 239961 فیلتر نتایج به سال:
Apply systems engineering approaches to measure and analysis vulnerabilities of military tactical RF wireless networks. Develop smart and innovative performance matrixes through EW modeling and simulation scenarios. Systematic utilize of systems engineering approaches with RF electronic warfare modeling and simulation scenarios to support research in vulnerability analysis. RF electronic warfar...
In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in electricity infrastructure, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path lengths, connectivity loss, and blackout sizes. The first two are purely topological metrics. The blac...
In this paper, we analyze and systematize the state-ofthe-art graph data privacy and utility techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and open-source Secure Graph data sharing/publishing system. In SecGraph, we systematically study, implement, and evaluate 11 graph data anonymization algorithms, 19 data utility metrics, and 15 modern Structure-base...
If the network topology is modeled by an undirected graph and we consider link failures, then a natural graph theoretic measure of vulnerability is the size of a minimum cut, that is, the minimum number of edges that have to be removed to disconnect the graph, which is called the (edge-)connectivity of the graph. This number, at the same time, is the guaranteed number of edge disjoint paths bet...
We study the vulnerability of electrical networks through structural analysis from a graph theory point of view. We measure and compare several important structural properties of different electrical networks, including a real power grid and several synthetic grids, as well as other infrastructural networks. The properties we consider include the minimum dominating set size, the degree distribu...
Security on Grid computing is often an afterthought. However assessing security of middleware systems is of the utmost importance because they manage critical resources owned by different organizations. To fulfill this objective we use First Principles Vulnerability Assessment (FPVA), an innovative analystic-centric (manual) methodology that goes beyond current automated vulnerability tools. FP...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید