Sciweavers

325 search results - page 11 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
CN
1999
93views more  CN 1999»
13 years 7 months ago
Bro: a system for detecting network intruders in real-time
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Vern Paxson
JNW
2006
142views more  JNW 2006»
13 years 7 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
MABS
2000
Springer
13 years 11 months ago
The Use of Models - Making MABS More Informative
g of target systems attempted but rather an abstraction of the target systems is modelled and insights bout the abstraction then applied back to the target systems. The MABS modell...
Bruce Edmonds
ICEIS
2007
IEEE
13 years 11 months ago
Case Handling Systems as Product Based Workflow Design Support
Case handling systems offer a solution to the lack of flexibility and adaptability in workflow management systems. Because they are data driven they potentially provide good suppor...
Irene T. P. Vanderfeesten, Hajo A. Reijers, Wil M....
HICSS
2006
IEEE
107views Biometrics» more  HICSS 2006»
14 years 1 months ago
Gaming Emergency Preparedness
This paper describes the design of a competitive game to support “offense” and “defense” teams as they develop and improve their scenarios and plans about possible crisis ...
Murray Turoff, Michael Chumer, Starr Roxanne Hiltz...