Sciweavers

948 search results - page 83 / 190
» Making a Game of Network Security
Sort
View
132
Voted
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 10 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
144
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
140
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 10 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
149
Voted
IAW
2003
IEEE
15 years 8 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
132
Voted
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 7 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson