Search For:

Displaying 1-4 out of 4 total
Building an Active Computer Security Ethics Community
Found in: IEEE Security and Privacy
By David Dittrich,Michael Bailey,Sven Dietrich
Issue Date:July 2011
pp. 32-40
The Declaration of Helsinki and Belmont Report motivated the growth of bioethics alongside traditional biomedical research. Unfortunately, no equivalently active ethics discipline has paralleled the growth of computer security research, where serious ethic...
 
Secure Software Architecture, Design, Implementation and Assurance
Found in: Hawaii International Conference on System Sciences
By Robert C. Seacord, Sven Dietrich, Daniel Plakosh
Issue Date:January 2007
pp. 279
Society?s increased dependency on networked software systems has been matched by an increase in the number of attacks aimed at these systems. These attacks--directed at organizations and individuals--have resulted in loss and compromise of sensitive data, ...
   
Building An Active Computer Security Ethics Community
Found in: IEEE Security and Privacy
By David Dittrich, Michael Bailey, Sven Dietrich
Publication Date: December 2010
pp. N/A
The profound statements of the Declaration of Helsinki and Belmont Report motivated a rich and active discipline of bioethics growing alongside traditional biomedical research. Unfortunately, no equivalently active ethics discipline has parallelled the gro...
 
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
Found in: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC '10)
By Baris Coskun, Nasir Memon, Sven Dietrich
Issue Date:December 2010
pp. 131-140
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same network even before they exhibit any overtly malicious behavior. Detection is b...
     
 1