Sciweavers

1278 search results - page 180 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
161
Voted
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 7 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
100
Voted
USITS
2003
15 years 4 months ago
Scriptroute: A Public Internet Measurement Facility
We present Scriptroute, a system that allows ordinary Internet users to conduct network measurements from remote vantage points. We seek to combine the flexibility found in dedic...
Neil T. Spring, David Wetherall, Thomas E. Anderso...
162
Voted
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 7 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
139
Voted
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 9 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
TISSEC
2008
202views more  TISSEC 2008»
15 years 3 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning