Sciweavers

1154 search results - page 159 / 231
» Making Self-organizing Systems Secure
Sort
View
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
14 years 11 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
EMS
2008
IEEE
14 years 11 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
CIIT
2004
132views Communications» more  CIIT 2004»
14 years 11 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
CCS
2010
ACM
14 years 10 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
COMPSEC
2008
99views more  COMPSEC 2008»
14 years 10 months ago
SSL/TLS session-aware user authentication revisited
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, and there are only a few technologies available to mitigate the risks. In [OHB05], ...
Rolf Oppliger, Ralf Hauser, David A. Basin