Sciweavers

5511 search results - page 56 / 1103
» Security for Network Places
Sort
View
ICMB
2005
IEEE
98views Business» more  ICMB 2005»
14 years 3 months ago
Security Issues in SIP Signaling in Wireless Networks and Services
SIP appears to be a powerful and useful signaling protocol supporting mobility for wireless IP networks but it has inherent weaknesses and dangers. This paper is a study on the se...
Elthea T. Lakay, Johnson I. Agbinya
IJISEC
2008
188views more  IJISEC 2008»
13 years 8 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
AUSFORENSICS
2003
13 years 11 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
CCS
2009
ACM
14 years 5 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
WOWMOM
2005
ACM
99views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
Small Worlds and the Security of Ubiquitous Computing
This paper considers the small-world phenomenon in two contexts: ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their nat...
Harald Vogt