نتایج جستجو برای: computer security

تعداد نتایج: 723551  

Journal: :IEEE Communications Surveys and Tutorials 2021

Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker that are reported almost every day. Increasingly, we relying networked infrastructure with advent IoT, billions devices will be connected to Internet, providing attackers opportunities exploi...

2007
Luay A. Wahsheh

To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. Our research demonstrates how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) archit...

2006
DAWN SONG

Dawn Song is an Assistant Professor at Carnegie Mellon University. She obtained her PhD in Computer Science from UC Berkeley. Her research interest lies in security and privacy issues in computer systems and networks. She is the author of more than 35 research papers in areas ranging from software security, networking security, database security, distributed systems security, to applied cryptog...

2013
Florian Kerber Jan Holz Hendrik Thüs Ulrik Schroeder

HackIts are short computer security challenges which are often Web-based. Their purpose is to raise awareness for common security issues by showing different intrusion possibilities in today’s computer security. We present a framework that allows security education in a safe, modular, and motivating way, with the possibility of flexible and low-cost integration into existing curricula. By solvi...

2013
Majid Arianezhad L. Jean Camp Timothy Kelley Douglas Stebila

Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we examine whether computer or security exp...

2008
Martyn Styles Theodore Tryfonas

It is becoming increasingly important that employees are taken through a more rigorous security-awareness training programme, in order to protect their personal computer and the networks behind it and to ‘protect them from themselves’. Virus and spam writers have begun to try to fool employees with ‘social engineering’ techniques, which prey on an employee’s willingness to believe in an email s...

2006
James P. Early Carla E. Brodley

In this dissertation, we examine the machine learning issues raised by the domain of anomaly detection for computer security. The anomaly detection task is to recognize the presence of an unusual and potentially hazardous state within the activities of a computer user, system, or network. “Unusual” is defined with respect to some model of “normal” behavior which may be either hard-coded or lear...

2006
Semir Daskapan

Current security systems are designed to prevent foreseeable attacks. Those security systems do not prevent effectively the more emergent types of attacks, like a botnet, whose presence and behavior is difficult to predict. In order to predominate those types of attacks, we advocate an adaptive security approach based on the animal immune system. But since those sophisticated attacks can also b...

1998
Ivan Krsul Eugene Spafford Tugkan Tuglular

The notion of Computer Policy is fundamental to the study of computer security models, the analysis of computer vulnerabilities, the development of intrusion detection tools, and the development of misuse detection tools. Security only makes sense in relation to security policies that specify what is being protected, how it must be protected, who has access to what is being protected, etc. Poli...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید