Sciweavers

205 search results - page 20 / 41
» Foundations for Intrusion Prevention
Sort
View
JDFP
2008
81views more  JDFP 2008»
14 years 9 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
15 years 4 months ago
Towards a Methodology for Profiling Cyber Criminals
The progress of future e-business and ecommerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial p...
Leonard Kwan, Pradeep Ray, Greg Stephens
ICWE
2007
Springer
15 years 3 months ago
Transparent Interface Composition in Web Applications
Abstract. In this paper we present an approach for oblivious composition of Web user interfaces, particularly for volatile functionality. Our approach, which is inspired on well-kn...
Jeronimo Ginzburg, Gustavo Rossi, Matias Urbieta, ...
ICARIS
2007
Springer
15 years 1 months ago
Defence Against 802.11 DoS Attacks Using Artificial Immune System
In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security frame...
M. Zubair Shafiq, Muddassar Farooq
72
Voted
WEBNET
2001
14 years 11 months ago
Managing Distributed Personal Firewalls with Smart Data Servers
: Modern security architectures tend to become more and more complex. Not only the chances to improve Web applications using several data channels and diverse (TCP-)ports are very ...
Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002,...