Sciweavers

5 search results - page 1 / 1
» Criminalising hacking tools
Sort
View
DI
2006
64views more  DI 2006»
13 years 5 months ago
Criminalising hacking tools
Peter Sommer
IRI
2006
IEEE
13 years 11 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
AWCC
2004
Springer
13 years 11 months ago
Real-Time Emulation of Intrusion Victim in HoneyFarm
Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of informa...
Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hu...
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 2 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
ATC
2009
Springer
13 years 8 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...