Sciweavers

148 search results - page 2 / 30
» Ethics in Security Vulnerability Research
Sort
View
JAISE
2011
243views more  JAISE 2011»
13 years 21 days ago
Safeguards in a world of ambient intelligence: A social, economic, legal, and ethical perspective
The book “Safeguards in a world of ambient intelligence” is unique in its kind. It discusses social, economic, legal, technological and ethical issues related to identity, priv...
Egon L. van den Broek
CRITIS
2007
13 years 7 months ago
ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research
The transformation of the European infrastructure creates considerable system security challenges. GRID is a joint effort of six European research organizations to achieve consensu...
Alberto Stefanini, Gerard Doorman, Nouredine Hadjs...
ISSA
2004
13 years 7 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
13 years 9 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
ICISS
2009
Springer
14 years 9 days ago
A Survey of Voice over IP Security Research
We present a survey of Voice over IP security research. Our goal is to provide a roadmap for researchers seeking to understand existing capabilities and, and to identify gaps in ad...
Angelos D. Keromytis