Sciweavers

948 search results - page 103 / 190
» Making a Game of Network Security
Sort
View
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
15 years 2 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
ISPDC
2010
IEEE
14 years 8 months ago
SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks
—In this paper, we propose SKAIT, a parameterized symmetric key pre-distribution scheme that guarantees a secure and confidential channel between every pair of nodes in a wirele...
Ramon Novales, Neeraj Mittal, Kamil Saraç
CCS
2008
ACM
14 years 12 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 8 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
ACSC
2004
IEEE
15 years 1 months ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald