Sciweavers

5722 search results - page 447 / 1145
» Security Function Interactions
Sort
View
CRITIS
2007
15 years 6 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 5 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
ACSC
2010
IEEE
14 years 11 months ago
Analysis of the periodical payment framework using restricted proxy certificates
This paper discusses the design and implementation of a payment framework that is loosely based on the direct debit payment model. We define such payments as one in which customer...
Grigori Goldman, Lawrie Brown
CSFW
2012
IEEE
13 years 7 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
BMCBI
2006
120views more  BMCBI 2006»
15 years 4 months ago
SCOWLP: a web-based database for detailed characterization and visualization of protein interfaces
Background: Currently there is a strong need for methods that help to obtain an accurate description of protein interfaces in order to be able to understand the principles that go...
Joan Teyra, Andreas Doms, Michael Schroeder, M. Te...