Sciweavers

76 search results - page 4 / 16
» Cyber security through visualization
Sort
View
ECIS
2000
13 years 11 months ago
Electronic Notary System and its Certification Mechanism
We have developed a prototype electronic notary system (CYNOS : CYber NOtary System). CYNOS proves facts by providing the evidence (notary token) of events and/or actions that cou...
Shinichi Nakahara
SPRINGSIM
2007
13 years 11 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter
ICDCIT
2004
Springer
14 years 3 months ago
Secure Requirements Elicitation Through Triggered Message Sequence Charts
Abstract. This paper argues for performing information-flow-based security analysis in the first phaseof the software development life cycle itself ie in the requirements elicita...
Arnab Ray, Bikram Sengupta, Rance Cleaveland
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
14 years 4 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung

Publication
283views
12 years 8 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang