Showing 1 - 10 of 38 results for the Publish Year - 2005
In this paper, the authors present a standard specification for managed strings.
In this paper, the authors describe the capabilities present in bot malware and the motivations for operating botnets.
This paper proposes to use predicate abstraction for verifying RTL Verilog, a technique successfully used for software verification.
The Survivability and Information Assurance (SIA) Curriculum is designed to teach experienced system administrators about security as well as a means for integrating security into their routine tasks.
In this paper, the authors introduce a tool to address two problems with using Net-Flow logs for security analysis.
In this 2005 paper, the authors give an overview of spyware, provide examples of common threats, and describe how to defend against spyware.
In this paper, Josh McNutt discusses the R statistical language as an analysis and visualization interface to SiLK flow analysis tools.
In this paper, Jason Milletary identifies technical capabilities used to conduct phishing scams, reviews trends, and discusses countermeasures.
In this paper, the authors present an attempt to gain a better understanding of how a CSIRT can handle a growing work load with limited resources.
In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.