نتایج جستجو برای: graph vulnerability
تعداد نتایج: 239961 فیلتر نتایج به سال:
As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gath...
در این پایان نامه رنگ آمیزی دینامیکی یک گراف را بیان و مطالعه می کنیم. یک –kرنگ آمیزی سره ی رأسی گراف g را رنگ آمیزی دینامیکی می نامند اگر در همسایه های هر رأس v?v(g) با درجه ی حداقل 2، حداقل 2 رنگ متفاوت ظاهر شوند. کوچکترین عدد صحیح k، به طوری که g دارای –kرنگ آمیزی دینامیکی باشد را عدد رنگی دینامیکی g می نامند و آنرا با نماد ?_2 (g) نمایش می دهند. مونت گمری حدس زده است که تمام گراف های منتظم ...
This paper presents an assessment of the vulnerability of the power grid to blackout using graph topological indexes. Based on a FERC 715 report and the outage reports, the cascading faults of summer WSCC 1996 are reconstructed, and the graphical property of the grid is compared between two cases: when the blackout triggering lines are removed simulating the actual sequence of cascading outages...
Akers et al. (Proceedings of the International Conference on Parallel Processing, 1987, pp. 393–400) proposed an interconnection topology, the star graph, as an alternative to the popular n-cube. Jwo et al. (Networks 23 (1993) 315–326) studied the alternating group graph An. Cheng et al. (Super connectivity of star graphs, alternating group graphs and split-stars, Ars Combin. 59 (2001) 107–116)...
This paper describes a software system that provides significant new capabilities for visualization and analysis of network attack graphs produced through Topological Vulnerability Analysis (TVA). The TVA approach draws on a database of known exploits and system vulnerabilities to provide a connected graph representing possible cyber-attack paths within a given network. Our visualization approa...
The National Vulnerability Database (NVD) provides unstructured descriptions of computer security vulnerabilities. These descriptions do not directly provide the information necessary to formally analyze how the user’s and the attacker’s actions lead to the exploit. Moreover, the descriptions vary in how they describe the vulnerabilities. In this paper, we describe a system for automatically ex...
Determining the functional relationships between nodes in complex networks such as the neuronal networks is important. In recent years, graph theory has been employed to characterize the functional network structure of the brain from neurophysiological data such as the electroencephalogram (EEG). Current work on graph theoretic analysis of brain networks focuses on global characteristics of the...
This paper presents the Cellular Network Vulnerability Assessment Toolkit CAT, designed for end-to-end vulnerability assessment of 3G networks. It is the first tool of its kind to model and represent 3G network vulnerabilities and attacks as attack graphs. CAT uses freely available 3G telecommunication specifications written in SDL, the standard Specification and Description Language to produce...
Abstract This article investigates cybersecurity issues related to in-vehicle communication networks. In-vehicle network security is evaluated based on the protection characteristics of components and topology network. The automotive topologies are represented as undirected weighted graphs, their vulnerability estimated specific generated graph. Thirteen different vehicle models have been inves...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید