Sciweavers

438 search results - page 24 / 88
» Defending Critical Infrastructure
Sort
View
137
Voted
MOBIHOC
2010
ACM
15 years 14 days ago
On quality of monitoring for multi-channel wireless infrastructure networks
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource manage...
Arun Chhetri, Huy Anh Nguyen, Gabriel Scalosub, Ro...
148
Voted
GAMESEC
2010
139views Game Theory» more  GAMESEC 2010»
15 years 17 days ago
Design of Network Topology in an Adversarial Environment
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
Assane Gueye, Jean C. Walrand, Venkat Anantharam
DISCEX
2003
IEEE
15 years 7 months ago
Towards a Rigorous Definition of Information System Survivability
The computer systems that provide the information underpinnings for critical infrastructure applications, both military and civilian, are essential to the operation of those appli...
John C. Knight, Elisabeth A. Strunk, Kevin J. Sull...
109
Voted
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
15 years 9 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
125
Voted
ACSAC
2005
IEEE
15 years 8 months ago
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach
With the increasing security threats from infrastructure attacks such as worms and distributed denial of service attacks, it is clear that the cooperation among different organiza...
Dingbang Xu, Peng Ning