Sciweavers

1597 search results - page 77 / 320
» Mental Models of Computer Security
Sort
View
134
Voted
DSOM
2009
Springer
15 years 10 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...
INAP
2001
Springer
15 years 8 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
NSDI
2008
15 years 6 months ago
Predicted and Observed User Behavior in the Weakest-link Security Game
We aim to advance the understanding of individual security decision-making, by combining formal and behavioral analysis. We sketch a game-theoretic model of security decision-maki...
Jens Grossklags, Nicolas Christin, John Chuang
ISVC
2007
Springer
15 years 10 months ago
Haptic Exploration of Mathematical Knots
We present a novel multi-modal haptic interface for sketching and exploring the structure and properties of mathematical knots. Our interface derives from the familiar pencil-and-p...
Hui Zhang 0006, Sidharth Thakur, Andrew J. Hanson
NDSS
2005
IEEE
15 years 9 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot