Sciweavers

3482 search results - page 3 / 697
» Designing for security
Sort
View
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
14 years 12 days ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
CSREASAM
2006
13 years 10 months ago
Design and Implementation of a High-Performance Active Network Security System
This paper describes the design, implementation and performance of a high-performance security system - Active Network Security Immune System (ANSIS)
Wen Ouyang, Kun-Ming Yu, Wen-Ping Lee
CCS
2006
ACM
14 years 14 days ago
Is risk a good security metric?
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...
O. Sami Saydjari