Sciweavers

IEEESP
2011
13 years 3 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
IEEESP
2011
13 years 3 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
IEEESP
2011
13 years 7 months ago
Detecting Cheaters
Bruce Schneier
IEEESP
2011
13 years 7 months ago
Software Security in Practice
Brian Chess, Brad Arkin
IEEESP
2011
13 years 7 months ago
A Time for Choosing
Daniel E. Geer Jr.
IEEESP
2011
13 years 7 months ago
Directions in Incident Detection and Response
Richard Bejtlich, John Steven, Gunnar Peterson
IEEESP
2011
13 years 7 months ago
Reality Check
John Viega