Browsing by Subject "Computer viruses"
Now showing items 1-6 of 6
-
Article
A graph-theoretic network security game
(2005)Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. We model this practical network scenario as a non-cooperative multi-player game on ...
-
Article
A graph-theoretic network security game
(2008)Consider a network vulnerable to viral infection, where the security software can guarantee safety only to a limited part of it. We model this practical network scenario as a non-cooperative multi-player game on a graph, ...
-
Conference Object
The power of the defender
(2006)We consider a security problem on a distributed network. We assume a network whose nodes are vulnerable to infection by threats (e.g. viruses), the attackers. A system security software, the defender, is available in the ...
-
Article
Sensing CPU Voltage Noise Through Electromagnetic Emanations
(2018)This work proposes sensing CPU voltage noise through wireless electromagnetic (EM) emanations from the CPU. Compared to previous voltage monitoring methodologies, this approach is not intrusive as it does not require direct ...
-
Conference Object
Using argumentation logic for firewall configuration management
(2009)Firewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration and maintenance notoriously difficult. Tools are needed to analyse firewall ...
-
Article
Using argumentation logic for firewall policy specification and analysis
(2006)Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that ...