Sciweavers

136 search results - page 4 / 28
» Securing interdependent assets
Sort
View
105
Voted
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
15 years 7 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay
106
Voted
SAC
2010
ACM
15 years 7 months ago
Nudge: intermediaries' role in interdependent network security
ombiners for Software Hardening - Extended Abstract (Short Paper) Amir Herzberg and Haya Shulman (Bar Ilan University) The PUF Promise (Short Paper) Heike Busch and Miroslava Sotak...
Jens Grossklags, Svetlana Radosavac, Alvaro A. C&a...
73
Voted
NIPS
2003
15 years 1 months ago
Algorithms for Interdependent Security Games
Michael J. Kearns, Luis E. Ortiz
55
Voted
JIFS
2010
65views more  JIFS 2010»
14 years 11 months ago
Secure and efficient protocols for multiple interdependent issues negotiation
Katsuhide Fujita, Takayuki Ito, Mark Klein