Sciweavers

526 search results - page 2 / 106
» Increase honeypot security through data analysis
Sort
View
ASIACRYPT
2000
Springer
15 years 1 months ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare
INFOCOM
2002
IEEE
15 years 2 months ago
Increasing robustness of fault localization through analysis of lost, spurious, and positive symptoms
—This paper utilizes belief networks to implement fault localization in communication systems taking into account comprehensive information about the system behavior. Most previo...
Malgorzata Steinder, Adarshpal S. Sethi
ISF
2006
118views more  ISF 2006»
14 years 9 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
144
Voted
AIMS
2011
Springer
14 years 1 months ago
Finding and Analyzing Evil Cities on the Internet
Abstract. IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocatio...
Matthijs G. T. van Polen, Giovane Cesar Moreira Mo...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 4 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...