Sciweavers

76 search results - page 9 / 16
» Cyber security through visualization
Sort
View
ITCC
2005
IEEE
14 years 3 months ago
An Aspect-Oriented Approach to Mobile Agent Access Control
This paper presents an aspect-oriented approach to access control in mobile agent systems, where a multipoint security check mechanism visualizes the services of a host as individ...
Dianxiang Xu, Vivek Goel
COMCOM
2006
154views more  COMCOM 2006»
13 years 9 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
ITNG
2006
IEEE
14 years 3 months ago
Secure Two-Way Transfer of Measurement Data
We introduce a measurement system architecture, which has three main qualities: secure two-way transfer of measurement data, quick adaptability to different kinds of measurement ...
Marko Hassinen, Maija Marttila-Kontio, Mikko Saesm...
MOBIQUITOUS
2007
IEEE
14 years 4 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel
CHI
2007
ACM
14 years 1 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...