Sciweavers

IAW
2003
IEEE
14 years 5 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
IAW
2003
IEEE
14 years 5 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
IAW
2003
IEEE
14 years 5 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
IAW
2003
IEEE
14 years 5 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
IAW
2003
IEEE
14 years 5 months ago
Risk Probability Estimating Based on Clustering
Yong Chen, Christian Damsgaard Jensen, Jean-Marc S...
IAW
2003
IEEE
14 years 5 months ago
Hidden Processes: The Implication for Intrusion Detection
James Butler, Jeffrey Undercoffer, John Pinkston
DISCEX
2003
IEEE
14 years 5 months ago
An Aspect-Oriented Security Framework
The security of a software system is an attribute that permeates the whole system. As such, any attempt to address security concerns in a software system must, of necessity, be gl...
Viren Shah, Frank Hill
DISCEX
2003
IEEE
14 years 5 months ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
DISCEX
2003
IEEE
14 years 5 months ago
Improving Failure Responsiveness in Jini Leasing
Distributed systems require strategies to detect and recover from failures. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder acc...
Scott Rose, Kevin Bowers, Stephen Quirolgico, Kevi...