Search For:

Displaying 1-4 out of 4 total
Measuring Security
Found in: IEEE Security and Privacy
By Sal Stolfo, Steven M. Bellovin, David Evans
Issue Date:May 2011
pp. 60-65
To become a legitimate science, computer security requires metrics. However, metrics are the one thing most lacking in our current understanding of computer security. Computer security metrics can be based on computational complexity or on economic or biol...
Does Profiling Make Us More Secure?
Found in: IEEE Security & Privacy Magazine
By Shari Lawrence Pfleeger,Marc Rogers,Masooda Bashir,Kelly Caine,Deanna Caputo,Michael Losavio,Sal Stolfo
Issue Date:July 2012
pp. 10-15
“Profiling” means making predictions about likely user behavior based on collected characteristics and activities. Shari Lawrence Pfleeger and Marc Rogers brought together a group of researchers from a variety of disciplines to discus...
Guest Editors' Introduction: The Science of Security
Found in: IEEE Security and Privacy
By David Evans, Sal Stolfo
Issue Date:May 2011
pp. 16-17
We're a long way from establishing a science of security comparable to the traditional physical sciences, and even from knowing whether such a goal is even achievable. Nevertheless, the articles in this special issue hint at the possibility and promise of ...
A holistic approach to service survivability
Found in: Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security (SSRS '03)
By Angelos D. Keromytis, Dan Rubenstein, Gail Kaiser, Janak Parekh, Jason Nieh, Philip N. Gross, Sal Stolfo, Vishal Misra
Issue Date:October 2003
pp. 11-22
We present SABER (Survivability Architecture: Block, Evade, React), a proposed survivability architecture that blocks, evades and reacts to a variety of attacks by using several security and survivability mechanisms in an automated and coordinated fashion....