Sciweavers

76 search results - page 3 / 16
» Cyber security through visualization
Sort
View
NCA
2005
IEEE
13 years 11 months ago
Networking Aspects in the DPASA Survivability Architecture: An Experience Report
The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...
ICIAP
2005
ACM
14 years 5 months ago
Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations
Parameterized wavelet filters and wavelet packet subband structures are discussed to be used as key dependent wavelet transforms in order to enhance the security of wavelet based h...
Albert Meixner, Andreas Uhl
WCE
2007
13 years 7 months ago
Beyond Web Intermediaries: A Framework for Securing Digital Content on Client Systems
—The move to begin to place liabilities for copyright violations on internet intermediaries such as ISPs and Cyber Cafes as a result of contents allowed through their networks is...
Stella C. Chiemeke, Olumide B. Longe
PADS
2005
ACM
13 years 11 months ago
Requirements on Worm Mitigation Technologies in MANETS
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA Defense Against Cybe...
Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andr...