We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
g of target systems attempted but rather an abstraction of the target systems is modelled and insights bout the abstraction then applied back to the target systems. The MABS modell...
Case handling systems offer a solution to the lack of flexibility and adaptability in workflow management systems. Because they are data driven they potentially provide good suppor...
Irene T. P. Vanderfeesten, Hajo A. Reijers, Wil M....
This paper describes the design of a competitive game to support “offense” and “defense” teams as they develop and improve their scenarios and plans about possible crisis ...
Murray Turoff, Michael Chumer, Starr Roxanne Hiltz...