Sciweavers

129
Voted
MMMACNS
2010
Springer
15 years 9 days ago
A Comparison of Feature-Selection Methods for Intrusion Detection
Hai Thanh Nguyen, Slobodan Petrovic, Katrin Franke
96
Voted
MMMACNS
2010
Springer
15 years 9 days ago
Predictive Security Analysis for Event-Driven Processes
Roland Rieke, Zaharina Stoynova
135
Voted
MMMACNS
2010
Springer
15 years 25 days ago
Symptoms-Based Detection of Bot Processes
Botnets have become the most powerful tool for attackers to victimize countless users across cyberspace. Previous work on botnet detection has mainly focused on identifying infecte...
Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai ...
114
Voted
MMMACNS
2010
Springer
15 years 25 days ago
Policy-Based Design and Verification for Mission Assurance
Shiu-Kai Chin, Sarah Muccio, Susan Older, Thomas N...
101
Voted
MMMACNS
2010
Springer
15 years 25 days ago
Credentials Management for High-Value Transactions
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...
MMMACNS
2010
Springer
15 years 25 days ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...