Sciweavers

5475 search results - page 1023 / 1095
» Model Driven Security
Sort
View
NDSS
2009
IEEE
15 years 7 months ago
SybilInfer: Detecting Sybil Nodes using Social Networks
SybilInfer is an algorithm for labelling nodes in a social network as honest users or Sybils controlled by an adversary. At the heart of SybilInfer lies a probabilistic model of h...
George Danezis, Prateek Mittal
ICIW
2009
IEEE
15 years 7 months ago
SS-IDS: Statistical Signature Based IDS
Security of web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based In...
Payas Gupta, Chedy Raïssi, Gérard Dray...
ICST
2009
IEEE
15 years 7 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
92
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Capabilities of Low-Power Wireless Jammers
— In this paper, motivated by the goal of modeling the fine-grain capabilities of jammers for the context of security in low-power wireless networks, we experimentally character...
Lifeng Sang, Anish Arora
111
Voted
TRUST
2009
Springer
15 years 7 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
« Prev « First page 1023 / 1095 Last » Next »