Sciweavers


0
posts
with
0
views
149profile views
E. Paul RatazziEngineer
Air Force
E. Paul Ratazzi
COMPSEC
2004
156views more  COMPSEC 2004»
13 years 4 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
JERIC
2006
68views more  JERIC 2006»
13 years 4 months ago
Teaching context in information security
: This paper discusses teaching the application of technical idea through non-technical discussions, especially the use of puzzles to engage students. After discussing the need for...
Matt Bishop
SEC
1993
13 years 5 months ago
Teaching Computer Security
This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.
Matt Bishop
ISSA
2004
13 years 5 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
AISM
2004
13 years 6 months ago
Computer Security Research: Approaches and Assumptions
Researchers, no matter their field, are faced with the problem of selecting an appropriate approach before conducting a study. The purpose of this paper is to provide an overview ...
Christopher Bolan, Daniel Mende
HICSS
2006
IEEE
140views Biometrics» more  HICSS 2006»
13 years 10 months ago
Programming Education in the Era of the Internet: A Paradigm Shift
Over the last several years, the Computer Science (CS) community has put a great deal of effort in to the area of security research, and have made great advances. Counterintuitive...
Scott Harrison, Nadine Hanebutte, Jim Alves-Foss
FC
2007
Springer
122views Cryptology» more  FC 2007»
13 years 10 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
ACSAC
2008
IEEE
13 years 11 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
13 years 11 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...