Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
IAW
2003
IEEE
11 years 10 months ago
Methodology of Risk Assessment in Mobile Agent System Design
Ingo McLean, Boleslaw K. Szymanski, Alan Bivens
IAW
2003
IEEE
11 years 10 months ago
The Kerf toolkit for intrusion analysis
Javed A. Aslam, Sergey Bratus, David Kotz, Ronald ...
IAW
2003
IEEE
11 years 10 months ago
Static Verification of Worm and virus Behavior in binary Executables using Model Checking
- Use offormal methods in any application scenario requires a precise characterization and representation of the properties that need to be verified The target, which is desired ri...
Prabhat K. Singh, Arun Lakhotia
IAW
2003
IEEE
11 years 10 months ago
Detecting Insider Threats by Monitoring System Call Activity
Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenni...
IAW
2003
IEEE
11 years 10 months ago
Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency
— The Computational Resiliency library (CRLib) provides distributed systems with the ability to sustain operation and dynamically restore the level of assurance in system functio...
Norka B. Lucena, Steve J. Chapin, Joohan Lee
IAW
2003
IEEE
11 years 10 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
IAW
2003
IEEE
11 years 10 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
IAW
2003
IEEE
11 years 10 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
books