Sciweavers

20 search results - page 3 / 4
» Cybersecurity
Sort
View
CNSM
2010
13 years 5 months ago
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance
This paper describes how information collected by enterprise system management (ESM) platforms can be utilized in a novel approach to assess the information assurance delivered by ...
Amy Fedyk, Michael Atighetchi, Partha Pratim Pal
WISEC
2010
ACM
14 years 2 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 1 months ago
Quantum Cryptography For Secure Optical Networks
Dense Wavelength Division Multiplexing optical networks transport a huge aggregate traffic exceeding Tbps per single fiber, and passive optical network technology has been extended...
Stamatios V. Kartalopoulos
SOCIALCOM
2010
13 years 5 months ago
Managed Mission Assurance - Concept, Methodology and Runtime Support
We interpret "mission assurance" to mean the guarantee that Mission Essential Functionality (MEF) provided by an information system is continued despite partial failures ...
Partha Pratim Pal, Kurt Rohloff, Michael Atighetch...
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
12 years 3 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson