Sciweavers

557 search results - page 44 / 112
» Two experiences designing for effective security
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 1 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
CCS
2003
ACM
14 years 1 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
DSN
2009
IEEE
14 years 3 months ago
Power supply induced common cause faults-experimental assessment of potential countermeasures
Fault-tolerant architectures based on physical replication of components are vulnerable to faults that cause the same effect in all replica. Short outages in a power supply shared...
Peter Tummeltshammer, Andreas Steininger
IPCCC
2007
IEEE
14 years 3 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong