Abstract The CADHo project (Collection and Analysis of Data from Honeypots) is an ongoing research action funded by the French ACI “Securiteé & Informatique”[1]. It aims at building …
G Vache - 2009 3rd International Symposium on Empirical …, 2009 - ieeexplore.ieee.org
This paper presents the quantitative characterization of vulnerability life cycle and of exploit creation by probability distributions. This work aims at helping the production of quantitative …
J Di, S Smith - 2007 IEEE Region 5 Technical Conference, 2007 - ieeexplore.ieee.org
Similar to the effects of software viruses, hardware can also be compromised by introduction of malicious logic into circuits to cause unwanted system behaviors. This can be done by …
Cyber physical systems (CPS) denote systems that embed programmable components in order to control a physical process or infrastructure. CPS are henceforth widely used in …
Своевременность и адекватность реагирования на инциденты компьютерной безопасности, а также потери организаций от компьютерных атак, зависят от точности …
Attack graphs and attack trees are a popular method of mathematically and visually representing the sequence of events that lead to a successful cyber-attack. Despite their …
S Zhang, X Ou, J Homer - Detection of Intrusions and Malware, and …, 2011 - Springer
A significant challenge in evaluating network security stems from the scale of modern enterprise networks and the vast number of vulnerabilities regularly found in software …