Search For:

Displaying 1-5 out of 5 total
An Attack Surface Metric
Found in: IEEE Transactions on Software Engineering
By Pratyusa K. Manadhata, Jeannette M. Wing
Issue Date:May 2011
pp. 371-386
Measurement of software security is a long-standing challenge to the research community. At the same time, practical security metrics and measurements are essential for secure software development. Hence, the need for metrics is more pressing now due to a ...
 
The Operational Role of Security Information and Event Management Systems
Found in: IEEE Security & Privacy
By Sandeep Bhatt,Pratyusa K. Manadhata,Loai Zomlot
Issue Date:September 2014
pp. 35-41
An integral part of an enterprise computer security incident response team (CSIRT), the security operations center (SOC) is a centralized unit tasked with real-time monitoring and identification of security incidents. Security information and event managem...
 
Big Data Analytics for Security
Found in: IEEE Security & Privacy
By Alvaro A. Cardenas,Pratyusa K. Manadhata,Sreeranga P. Rajan
Issue Date:November 2013
pp. 74-76
Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate ...
 
Traffic Signature-Based Mobile Device Location Authentication
Found in: IEEE Transactions on Mobile Computing
By Jack Brassil,Pratyusa K. Manadhata,Ravi Netravali
Issue Date:September 2014
pp. 1-1
Spontaneous and robust mobile device location authentication can be realized by supplementing existing 802.11x access points (AP) with small cells. We show that by transferring network traffic to a mobile computing device associated with a femtocell while ...
 
Big data for security: challenges, opportunities, and examples
Found in: Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security (BADGERS '12)
By Pratyusa K. Manadhata
Issue Date:October 2012
pp. 3-4
This is the age of big data. Enterprises collect large amounts of data about their operations and analyze the data to improve all aspects of their businesses. Big data for security, i.e., the analysis of very large enterprise data sets to identify actionab...
     
 1