Sciweavers

107 search results - page 11 / 22
» The Use of Attack and Protection Trees to Analyze Security f...
Sort
View
HPCA
2009
IEEE
14 years 8 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
ATAL
2009
Springer
14 years 18 days ago
Dynamic information source selection for intrusion detection systems
Our work presents a mechanism designed for the selection of the optimal information provider in a multi-agent, heterogeneous and unsupervised monitoring system. The selfadaptation...
Martin Rehák, Eugen Staab, Michal Pechoucek...
DIMVA
2006
13 years 9 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...
TSE
2010
152views more  TSE 2010»
13 years 6 months ago
An Experience in Testing the Security of Real-World Electronic Voting Systems
—Voting is the process through which a democratic society determines its government. Therefore, voting systems are as important as other well-known critical systems, such as air ...
Davide Balzarotti, Greg Banks, Marco Cova, Viktori...
CP
2007
Springer
14 years 2 months ago
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
Defence trees and CP-net (ceteris paribus network) are two useful approaches that can be used to help a system administrator to analyze a security scenario and to give him a model ...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...