Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CRITIS
2007
11 years 9 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
CRITIS
2007
11 years 9 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
CRITIS
2007
11 years 9 months ago
Detecting DNS Amplification Attacks
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS ...
Georgios Kambourakis, Tassos Moschos, Dimitris Gen...
CRITIS
2007
11 years 9 months ago
An Analysis of Cyclical Interdependencies in Critical Infrastructures
Abstract In this paper we discuss the properties and algorithmic methods for the identification and classification of cyclical interdependencies in critical infrastructures based...
Nils Kalstad Svendsen, Stephen D. Wolthusen
CRITIS
2007
11 years 9 months ago
An Approach to Trust Management Challenges for Critical Infrastructures
Ioanna Dionysiou, Deborah A. Frincke, David E. Bak...
CRITIS
2007
11 years 9 months ago
The Structure of the Sense of Security, Anshin
Traditional research on security has been based on the assumption that users would feel secure when provided with secure systems and services. In this research we address factors ...
Yuko Murayama, Natsuko Hikage, Yasuhiro Fujihara, ...
CRITIS
2007
11 years 9 months ago
ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research
The transformation of the European infrastructure creates considerable system security challenges. GRID is a joint effort of six European research organizations to achieve consensu...
Alberto Stefanini, Gerard Doorman, Nouredine Hadjs...
CRITIS
2007
11 years 9 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
CRITIS
2007
11 years 9 months ago
LoRDAS: A Low-Rate DoS Attack against Application Servers
In a communication network, there always exist some specific servers that should be considered a critical infrastructure to be protected, specially due to the nature of the servic...
Gabriel Maciá-Fernández, Jesú...
CRITIS
2007
11 years 9 months ago
Managing Critical Infrastructures through Virtual Network Communities
Abstract. Virtual Interacting Network CommunIty (Vinci) is an abstract architecture to share in a secure way an ICT infrastructure among several user communities, each with its own...
Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra
books