—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
—This paper documents some of the socio-technical issues involved in developing security measures for a community environment, looking at the users of a wireless mesh network dep...
Sara Bury, Johnathan Ishmael, Nicholas J. P. Race,...
In our previous paper [1], we formalized an active information fusion framework based on dynamic Bayesian networks to provide active information fusion. This paper focuses on a ce...