In this paper, we discuss the use of formal requirementsengineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to repr...
Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Bri...
— Finding evidence of antedating is an important goal in many digital investigations. This paper explores how causality can expose antedating by investigating storage systems for...
In this paper, we propose an FDB based intra-Domain Traceback System (FDB-DTS), which is a hybrid traceback system composed of packet digesting boxes and an iterative query engine...
—Enterprise computing is moving towards more open, collaborative systems. Joining a business network must be made efficient, despite the technical and semantic interoperability ...
In this work, AdaBoost and C4.5, are employed for classifying Skype direct (UDP and TCP) communications from traffic log files. Pre-processing is applied to the traffic data to ex...
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACL management suffer some problems that need to be addressed in order to...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Marti...
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
k-Anonymity is a privacy property requiring that all combinations of key attributes in a database be repeated at least for k records. It has been shown that k-anonymity alone does...
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
Paul Rubel, Michael Atighetchi, Partha Pratim Pal,...
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...