Sciweavers

IEEESP
2011
14 years 7 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
IEEESP
2011
14 years 7 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
119
Voted
IEEESP
2011
14 years 11 months ago
Detecting Cheaters
Bruce Schneier
112
Voted
IEEESP
2011
14 years 11 months ago
Software Security in Practice
Brian Chess, Brad Arkin
136
Voted
IEEESP
2011
14 years 11 months ago
A Time for Choosing
Daniel E. Geer Jr.
IEEESP
2011
14 years 11 months ago
Directions in Incident Detection and Response
Richard Bejtlich, John Steven, Gunnar Peterson
110
Voted
IEEESP
2011
14 years 11 months ago
Does a Rising Tide Lift All Boats?
Daniel E. Geer Jr.
122
Voted
IEEESP
2011
14 years 11 months ago
Reality Check
John Viega