Cyber Civilization has become an important source of information sharing and professional activities like business, banking transactions, shopping, services and advertisement. With …
Traffic anomalies such as failures and attacks are increasing in frequency and severity, and thus identifying them rapidly and accurately is critical for large network operators. The …
We investigate the problem of optimally mitigating the progression of an adversary through a network in real-time, decreasing the probability of it reaching its goal (s), while minimizing …
Cloud computing represents a new paradigm where computing resources are offered as services in the world via communication Internet. As many new types of attacks are arising at …
In this paper, we propose a method of detecting and classifying web application attacks. In contrast to current signature-based security methods, our solution is an ontology based …
G Golan, M Vayman - US Patent 8,181,219, 2012 - Google Patents
(57) ABSTRACT A facility for receiving an embedded policy is provided. The facility checks an application program image for the presence of an embedded policy. If an embedded …
T Ryutov, L Zhou, C Neuman, T Leithead… - Proceedings of the …, 2005 - dl.acm.org
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access …
The advent of the metaverse has revolutionized virtual interactions and navigation, introducing intricate access control challenges. This paper addresses the need for effective …
Intrusion Response is a relatively new field of research. Recent approaches for the creation of Intrusion Response Systems (IRSs) use Reinforcement Learning (RL) as a primary …