Showing 11 - 20 of 38 results for the Publish Year - 2005 , Type - White Paper
In this paper, the authors present an automated overflow detection technique based on model checking and iterative refinement.
In this paper, the authors present their methods for detecting distributed attacks in backbone networks using sampled flow traffic data.
In this paper, Arno Wagner presents measurements and analysis done on a Swiss internet backbone during the Blaster and Witty internet worm outbreak.
In this paper, Jason Milletary identifies technical capabilities used to conduct phishing scams, reviews trends, and discusses countermeasures.
In this paper, the authors present the IPFIX protocol and discuss its applicability with a special focus on network security.
This paper discusses the preliminary system dynamic maps of the insider cyber-threat and describes the main ideas behind the research proposal.
This paper proposes to use predicate abstraction for verifying RTL Verilog, a technique successfully used for software verification.
In this paper, the authors describe the CENTAUR system, which was developed to help DoD security analysts better understand and defend the NIPRNet.
In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.
In this September 2005 paper, the authors present measurements done on a medium sized internet backbone and discusses accuracy issues.