Sciweavers

348 search results - page 53 / 70
» On a Network Forensics Model For Information Security
Sort
View
ATC
2009
Springer
13 years 10 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
WORM
2003
13 years 8 months ago
Experiences with worm propagation simulations
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss motivation and possibilities to study the behaviour of such worms and degrees of f...
Arno Wagner, Thomas Dübendorfer, Bernhard Pla...
CONEXT
2009
ACM
13 years 8 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
CW
2003
IEEE
14 years 20 days ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
CCS
2001
ACM
13 years 12 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé