Sciweavers

IEEESP
2011
12 years 8 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
IEEESP
2011
12 years 8 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
IEEESP
2011
12 years 11 months ago
Detecting Cheaters
Bruce Schneier
IEEESP
2011
12 years 11 months ago
Software Security in Practice
Brian Chess, Brad Arkin
IEEESP
2011
12 years 11 months ago
A Time for Choosing
Daniel E. Geer Jr.
IEEESP
2011
12 years 11 months ago
Directions in Incident Detection and Response
Richard Bejtlich, John Steven, Gunnar Peterson
IEEESP
2011
12 years 11 months ago
Reality Check
John Viega