Sciweavers

1737 search results - page 1 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 2 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
CCS
2003
ACM
13 years 9 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
ICDCS
2008
IEEE
13 years 11 months ago
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Siva...
JCM
2008
134views more  JCM 2008»
13 years 4 months ago
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network
Abstract-- Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly...
Li Xu, Jianwei Chen, Xiaoding Wang
CCS
2006
ACM
13 years 8 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...