121
click to vote
ACSAC
15 years 10 months ago
2005 IEEE
We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show atta...
144
click to vote
ACSAC
15 years 10 months ago
2005 IEEE
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
148
click to vote
ACSAC
15 years 10 months ago
2005 IEEE
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
110
click to vote
ACSAC
15 years 10 months ago
2005 IEEE
Honeyd [14] is a popular tool developed by Niels Provos that offers a simple way to emulate services offered by several machines on a single PC. It is a so called low interaction ...
|