Sciweavers

MMMACNS
2010
Springer
13 years 9 months ago
A Comparison of Feature-Selection Methods for Intrusion Detection
Hai Thanh Nguyen, Slobodan Petrovic, Katrin Franke
MMMACNS
2010
Springer
13 years 9 months ago
Predictive Security Analysis for Event-Driven Processes
Roland Rieke, Zaharina Stoynova
MMMACNS
2010
Springer
13 years 9 months ago
Symptoms-Based Detection of Bot Processes
Botnets have become the most powerful tool for attackers to victimize countless users across cyberspace. Previous work on botnet detection has mainly focused on identifying infecte...
Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai ...
MMMACNS
2010
Springer
13 years 9 months ago
Policy-Based Design and Verification for Mission Assurance
Shiu-Kai Chin, Sarah Muccio, Susan Older, Thomas N...
MMMACNS
2010
Springer
13 years 9 months ago
Credentials Management for High-Value Transactions
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...
MMMACNS
2010
Springer
13 years 9 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...