Search For:

Displaying 1-3 out of 3 total
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice
Found in: IEEE Security & Privacy
By Douglas Maughan,David Balenson,Ulf Lindqvist,Zachary Tudor
Issue Date:March 2013
pp. 14-23
New and innovative technologies will only make a difference if they're deployed and used. It doesn't matter how visionary a technology is unless it meets user needs and requirements and is available as a product via user-acceptable channels. One of the cyb...
Integrating Intrusion Detection and Fault Localization in Manets
Found in: MILCOM
By Dan Sterne, David Balenson, Simon Tsang, Petros Mouchtaris, Maitreya Natu, Adarshpal Sethi
Issue Date:October 2006
pp. 1-7
In this exploratory paper, we propose that intrusion detection and fault localization techniques in MANET environments (which are commonly separate systems) should work cooperatively. We argue that an integrated approach will exhibit improved accuracy, and...
Barriers to science in security
Found in: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC '10)
By David Balenson, Mark Matties, Tom Longstaff
Issue Date:December 2010
pp. 127-129
In the past year, there has been significant interest in promoting the idea of applying scientific principles to information security. The main point made by information security professionals who brief at conferences seems to be that our field of informat...