Sciweavers

360 search results - page 39 / 72
» Information Security on the Logistical Network: An End-to-En...
Sort
View
WISEC
2010
ACM
14 years 3 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
ESOP
2008
Springer
13 years 10 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
ICEGOV
2007
ACM
14 years 9 days ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
CMS
2003
171views Communications» more  CMS 2003»
13 years 9 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
DSOM
2009
Springer
14 years 3 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...