Search Results
12. A Network Access Control Mechanism Based on Behavior Profiles
13. Baiting Inside Attackers Using Decoy Documents
14. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
15. Designing Host and Network Sensors to Mitigate the Insider Threat
16. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
17. Automating the Injection of Believable Decoys to Detect Snooping
18. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
19. Ethics in Security Vulnerability Research
20. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security
- « Previous
- Next »
- 1
- 2
- 3