نتایج جستجو برای: graph vulnerability

تعداد نتایج: 239961  

Journal: :Future Internet 2016
Jingsha He Chengyue Chang Peng He Muhammad Salman Pathan

As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gath...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده علوم پایه 1391

در این پایان نامه رنگ آمیزی دینامیکی یک گراف را بیان و مطالعه می کنیم. یک –kرنگ آمیزی سره ی رأسی گراف g را رنگ آمیزی دینامیکی می نامند اگر در همسایه های هر رأس v?v(g) با درجه ی حداقل 2، حداقل 2 رنگ متفاوت ظاهر شوند. کوچکترین عدد صحیح k، به طوری که g دارای –kرنگ آمیزی دینامیکی باشد را عدد رنگی دینامیکی g می نامند و آنرا با نماد ?_2 (g) نمایش می دهند. مونت گمری حدس زده است که تمام گراف های منتظم ...

2007
Charles J. Kim Obinna B. Obah

This paper presents an assessment of the vulnerability of the power grid to blackout using graph topological indexes. Based on a FERC 715 report and the outage reports, the cascading faults of summer WSCC 1996 are reconstructed, and the graphical property of the grid is compared between two cases: when the blackout triggering lines are removed simulating the actual sequence of cascading outages...

Journal: :Discrete Applied Mathematics 2002
Eddie Cheng Marc J. Lipman

Akers et al. (Proceedings of the International Conference on Parallel Processing, 1987, pp. 393–400) proposed an interconnection topology, the star graph, as an alternative to the popular n-cube. Jwo et al. (Networks 23 (1993) 315–326) studied the alternating group graph An. Cheng et al. (Super connectivity of star graphs, alternating group graphs and split-stars, Ars Combin. 59 (2001) 107–116)...

2008
Scott O'Hare Steven Noel Kenneth Prole

This paper describes a software system that provides significant new capabilities for visualization and analysis of network attack graphs produced through Topological Vulnerability Analysis (TVA). The TVA approach draws on a database of known exploits and system vulnerabilities to provide a connected graph representing possible cyber-attack paths within a given network. Our visualization approa...

2012
Malgorzata Urbanska Indrajit Ray Adele E. Howe Mark Roberts

The National Vulnerability Database (NVD) provides unstructured descriptions of computer security vulnerabilities. These descriptions do not directly provide the information necessary to formally analyze how the user’s and the attacker’s actions lead to the exploit. Moreover, the descriptions vary in how they describe the vulnerabilities. In this paper, we describe a system for automatically ex...

2011
Marcos E. Bolanos Selin Aviyente

Determining the functional relationships between nodes in complex networks such as the neuronal networks is important. In recent years, graph theory has been employed to characterize the functional network structure of the brain from neurophysiological data such as the electroencephalogram (EEG). Current work on graph theoretic analysis of brain networks focuses on global characteristics of the...

2006
Kameswari Kotapati Peng Liu Thomas F. La Porta

This paper presents the Cellular Network Vulnerability Assessment Toolkit CAT, designed for end-to-end vulnerability assessment of 3G networks. It is the first tool of its kind to model and represent 3G network vulnerabilities and attacks as attack graphs. CAT uses freely available 3G telecommunication specifications written in SDL, the standard Specification and Description Language to produce...

Journal: :Journal of Electronic Testing 2021

Abstract This article investigates cybersecurity issues related to in-vehicle communication networks. In-vehicle network security is evaluated based on the protection characteristics of components and topology network. The automotive topologies are represented as undirected weighted graphs, their vulnerability estimated specific generated graph. Thirteen different vehicle models have been inves...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید