National Repository of Grey Literature 3 records found  Search took 0.00 seconds. 
Graphical Tool for Creation and Modification of Graphs
Hynšt, Miroslav ; Navrátil, Jan (referee) ; Zuzaňák, Jiří (advisor)
This paper deals with basics of the graph theory and graph rewriting. In the first part there is described a graph, graph rewriting systems, graph grammar and algebraic approach to the graph rewriting. In the second part of this paper there is analyzed an implementation of the designed aplication for creation, modification and saving graphs and graph rewrite systems.
Graphical Tool for Creation and Modification of Graphs
Hynšt, Miroslav ; Navrátil, Jan (referee) ; Zuzaňák, Jiří (advisor)
This paper deals with basics of the graph theory and graph rewriting. In the first part there is described a graph, graph rewriting systems, graph grammar and algebraic approach to the graph rewriting. In the second part of this paper there is analyzed an implementation of the designed aplication for creation, modification and saving graphs and graph rewrite systems.
Attack Trees
MAI, Pavel
Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node [1]. We need a model of threats against computer systems. If we can understand all the different ways in which a system can be attacked, we can likely design countermeasures to thwart those attacks. And if we can understand who the attackers are - not to mention their abilities, motivations, and goals - maybe we can install the proper countermeasures to deal with the real threats [1].

Interested in being notified about new results for this query?
Subscribe to the RSS feed.