Information systems now form the backbone of nearly every government and private system. Increasingly these systems are networked together allowing for distributed operations, sha...
Frederick T. Sheldon, Stephen Gordon Batsell, Stac...
– In this paper, we present a comprehensive study on the design of secure and survivable wireless sensor networks (WSNs). Our goal is to develop a framework that provides both se...
With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...