Simulating adversarial interactions between intruders and system administrators using OODA-RR
Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
On the Limits of Payload-Oblivious Network Attack Detection
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Self Adaptive High Interaction Honeypots Driven by Game Theory
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Filesystem activity following a SSH compromise: an empirical study of file sequences
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned
Journal in Computer Virology
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
Heliza: talking dirty to the attackers
Journal in Computer Virology
Assessing security risk to a network using a statistical model of attacker community competence
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Hi-index | 0.00 |
It has been well established that most operating system crashes are due to bugs in device drivers. Because drivers are normally linked into the kernel address space, a buggy driver can wipe out kernel tables and bring the system crashing to a grinding ...