Sciweavers

28 search results - page 1 / 6
» An attack-norm separation approach for detecting cyber attac...
Sort
View
ISF
2006
70views more  ISF 2006»
13 years 4 months ago
An attack-norm separation approach for detecting cyber attacks
Nong Ye, Toni Farley, Deepak Lakshminarasimhan
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
13 years 11 months ago
Towards a Methodology for Profiling Cyber Criminals
The progress of future e-business and ecommerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial p...
Leonard Kwan, Pradeep Ray, Greg Stephens
WSC
2007
13 years 7 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
ICC
2007
IEEE
164views Communications» more  ICC 2007»
13 years 11 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
AINA
2006
IEEE
13 years 11 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...