Sciweavers

CSREASAM
2010
12 years 11 months ago
Security Challenges in Cloud Computing
Levent Ertaul, S. Singhal, Gökay Saldamli
CSREASAM
2010
13 years 1 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
CSREASAM
2010
13 years 1 months ago
Using Traffic Analysis to Identify Tor Usage - A Proposed Study
John Barker, Peter Hannay, Christopher Bolan
CSREASAM
2010
13 years 1 months ago
The 2010 IDN Homograph Attack Mitigation Survey
Peter Hannay, Christopher Bolan
CSREASAM
2010
13 years 1 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
CSREASAM
2010
13 years 2 months ago
A Hacking View of Access Control
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been propo...
Pedro Diaz-Gomez, Gregory Steen
CSREASAM
2010
13 years 2 months ago
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation
We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi...
Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey K...
CSREASAM
2010
13 years 2 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
CSREASAM
2010
13 years 2 months ago
Geotagging Where Cyberspace Comes to Your Place
- The combination of GPS services and information technology is increasing with the use of geotagging now occurring as a default action in many commodity based devices functionalit...
Craig Valli, Peter Hannay