Cyberspace Security and Defense: Research Issues |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
ComputerAided Tool Supporting Design and Evaluation | 3 |
A Case for Public and Private Review of Developing it Security Standards | 25 |
Assuring Critical Information Infrastructure | 43 |
Systemic Challenges for Critical Information Infrastructure Protection | 57 |
Decentralized Energy Supply to Secure Computer Systems | 75 |
Dependability | 99 |
Safety Analysis MethodsSoftware Development Questions | 101 |
Trust CaseA Case for Trustworthiness of it Infrastructures | 125 |
Early Warning Information Systems and Secure Access Control | 229 |
Foundations for the Development of Early Warning Information Systems | 231 |
IRIS Biometrics for Secure Remote Access | 259 |
New Directions in Access Control | 279 |
Cryptography | 295 |
Improved Block Cipher Counter Mode of Operation Schemes | 297 |
Electronic Signature in Real World | 315 |
A Note on Two Significant Developments in Cyberspace Security and Defense | 323 |
Dependability Structure and Infrastructure | 143 |
A Unified Approach | 161 |
Networks | 175 |
Design of Distributes Sensor Networks for Security and Defense | 177 |
A Distributed Approach to the Recognition of Geographically Located IP Devices | 193 |
Situational Awareness and Network Traffic Analysis | 209 |
331 | |
Intrusion Detection | 347 |
An Infrastructure for Distributed Event Acquisition | 349 |
Some Aspects of Neural Network Approach for Intrusion Detection | 367 |
Other editions - View all
Common terms and phrases
actions activity additional agent allows analysis application approach assessment associated assurance attack attributes authorization block certificate cipher collection communication complex components concentrator concerns connection considered container create critical database defined dependability detection determine distributed effect electronic energy environment evaluation event example failure fault Figure function given host identified implemented important infrastructure interaction International Internet involved iris issues means measures method mobile mode module nodes normal objectives operation organization packets platform port possible presented problem proposed protection protocol reason reference represent request requirements Research responsible result risk safety selection sensor server shows signature Source specific standard step structure Table threats tool trust users vulnerability