Sciweavers

TKDE
2002
67views more  TKDE 2002»
13 years 4 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu
DSS
2000
107views more  DSS 2000»
13 years 4 months ago
MarketNet: protecting access to information systems through financial market controls
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
IANDC
2008
128views more  IANDC 2008»
13 years 4 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
CSREASAM
2006
13 years 5 months ago
Gibraltar: A Mobile Host-Based Intrusion Protection System
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
COMPSAC
2005
IEEE
13 years 10 months ago
Experiences on Intrusion Tolerance Distributed Systems
Distributed systems today are very vulnerable to malicious attacks, either from insiders or outsiders. When an attacker controls a component of the system, he may steal some sensi...
Dengguo Feng, Ji Xiang