To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS ...
Abstract In this paper we discuss the properties and algorithmic methods for the identification and classification of cyclical interdependencies in critical infrastructures based...
Traditional research on security has been based on the assumption that users would feel secure when provided with secure systems and services. In this research we address factors ...
The transformation of the European infrastructure creates considerable system security challenges. GRID is a joint effort of six European research organizations to achieve consensu...
Alberto Stefanini, Gerard Doorman, Nouredine Hadjs...