Sciweavers

752 search results - page 73 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
111
Voted
RAID
2005
Springer
15 years 9 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
137
Voted
SOCO
2008
Springer
15 years 3 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
119
Voted
ESORICS
2007
Springer
15 years 9 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
150
Voted
ICC
2009
IEEE
125views Communications» more  ICC 2009»
15 years 1 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 9 months ago
Strategic Integration: A Knowledge Management Approach to Crisis Management
Every day, businesses are threatened by crises that could have been prevented or their impact lessened if only knowledge of causal and influencing factors were known and better ma...
Wei-Tsong Wang, Salvatore Belardo