Sciweavers

12 search results - page 1 / 3
» Protecting IT Systems from Cyber Crime
Sort
View
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
13 years 11 months ago
Towards a Methodology for Profiling Cyber Criminals
The progress of future e-business and ecommerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial p...
Leonard Kwan, Pradeep Ray, Greg Stephens
CJ
1998
63views more  CJ 1998»
13 years 4 months ago
Protecting IT Systems from Cyber Crime
Large-scale commercial, industrial and financial operations are becoming ever more interdependent, and ever more dependent on IT. At the same time, the rapidly growing interconnec...
R. Benjamin, B. Gladman, Brian Randell
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
12 years 8 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
CRITIS
2007
13 years 6 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
HICSS
2008
IEEE
102views Biometrics» more  HICSS 2008»
13 years 11 months ago
Retrofitting Cyber Physical Systems for Survivability through External Coordination
Most Supervisory Control and Data Acquisition (SCADA) systems have been in operation for decades and they in general have 24x7 availability requirement, hence upgrading or adding ...
Kun Xiao, Shangping Ren, Kevin A. Kwiat