Sciweavers

SAC
2010
ACM
13 years 2 months ago
Cooperation enablement for centralistic early warning systems
From large-scale acquisition of information on security incidents by early warning systems (EWS) arises the opportunity to draw up a situation picture that allows detection of tre...
Ulrich Flegel, Johannes Hoffmann, Michael Meier
SEC
2008
13 years 5 months ago
Interactive Selection of ISO 27001 Controls under Multiple Objectives
Abstract IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitig...
Thomas Neubauer, Andreas Ekelhart, Stefan Fenz
CRISIS
2008
13 years 5 months ago
An ontology-based approach to react to network attacks
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) ...
Nora Cuppens-Boulahia, Frédéric Cupp...
MINENET
2006
ACM
13 years 9 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
IEEEARES
2007
IEEE
13 years 10 months ago
Collection of Quantitative Data on Security Incidents
Quantitative data about security threats is a precondition for a precise assessment of security risks and consequently for an efficient management of information security. Curren...
Thomas Nowey, Hannes Federrath