Sciweavers

367 search results - page 5 / 74
» The Return of the Sensitivity Attack
Sort
View
IEEEARES
2006
IEEE
14 years 1 months ago
Defense trees for economic evaluation of security investments
In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Stefano Bistarelli, Fabio Fioravanti, Pamela Peret...
CEAS
2008
Springer
13 years 9 months ago
Breaking out of the Browser to Defend Against Phishing Attacks
Current approaches to phishing prevention are focused on the web browser and the user's interaction with it. We present a new approach to allowing users to interact reliably ...
Diana K. Smetters, Paul Stewart
ALT
2006
Springer
14 years 4 months ago
Risk-Sensitive Online Learning
We consider the problem of online learning in settings in which we want to compete not simply with the rewards of the best expert or stock, but with the best trade-off between rew...
Eyal Even-Dar, Michael J. Kearns, Jennifer Wortman
EUROSEC
2009
ACM
14 years 2 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
ICWS
2009
IEEE
14 years 4 months ago
Analysis of Signature Wrapping Attacks and Countermeasures
In recent research it turned out that Boolean verification of digital signatures in the context of WSSecurity is likely to fail: If parts of a SOAP message are signed and the sig...
Sebastian Gajek, Meiko Jensen, Lijun Liao, Jö...