Sciweavers

14850 search results - page 131 / 2970
» The Security of
Sort
View
SP
2010
IEEE
419views Security Privacy» more  SP 2010»
14 years 1 months ago
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
Matt Fredrikson, Somesh Jha, Mihai Christodorescu,...
ACSAC
2004
IEEE
14 years 1 months ago
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders
Dick Brackney, Terrance Goan, Allen Ott, Lockheed ...
ACSAC
2004
IEEE
14 years 1 months ago
Detecting Kernel-Level Rootkits Through Binary Analysis
Christopher Krügel, William K. Robertson, Gio...
AINA
2004
IEEE
14 years 1 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
CCS
2004
ACM
14 years 1 months ago
Synthesising verified access control systems in XACML
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev