• Datalog

  • Referenced in 282 articles [sw20023]
  • data integration, information extraction, networking, program analysis, security, and cloud computing.[1] Its origins date...
  • SPINS

  • Referenced in 50 articles [sw02657]
  • focused on making these networks feasible and useful, security has received little attention. We present ... suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks ... easily matches the data rate of our network. Additionally, we demonstrate that the suite...
  • IRIS

  • Referenced in 12 articles [sw19373]
  • strategic security allocation in transportation networks. Security is a concern of major importance to governments...
  • MulVAL

  • Referenced in 7 articles [sw17743]
  • MulVAL: A Logic-based Network Security Analyzer. To determine the security impact software vulnerabilities have...
  • FIREMAN

  • Referenced in 6 articles [sw10594]
  • modeling and analysis. Security concerns are becoming increasingly critical in networked ... systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are very common ... significantly weaken the desired security. This paper introduces FIREMAN, a static analysis toolkit for firewall ... uncover several real misconfigurations in enterprise networks, some of which have been subsequently confirmed...
  • scyther

  • Referenced in 16 articles [sw09467]
  • Internet and other open networks, a large number of security protocols have been developed...
  • eHIP

  • Referenced in 4 articles [sw01490]
  • delivered data is indispensable for security-sensitive Wireless Sensor Networks (WSN). Unfortunately, conventional security approaches ... messages and sensed data. However, because the security threat from compromised sensor nodes cannot ... proposed to balance the tradeoff between network security and energy efficiency. In order to evaluate...
  • RADA

  • Referenced in 4 articles [sw20732]
  • messages should be allowed to cross network security domains. Promising experimental results demonstrate that RADA...
  • NodeXL

  • Referenced in 7 articles [sw04183]
  • grouping, and simplification The growing importance of network analysis has increased attention on interactive exploration ... business, legal, scientific, or national security decisions. Since networks are often complex and cluttered, strategies...
  • Plutus

  • Referenced in 10 articles [sw22497]
  • achieves strong security with overhead comparable to systems that encrypt all network traffic...
  • Firmato

  • Referenced in 12 articles [sw10595]
  • global knowledge of the security policy and of the network topology; (2) a model definition...
  • BotGraph

  • Referenced in 3 articles [sw21754]
  • BotGraph: large scale spamming botnet detection. Network security applications often require analyzing huge volumes...
  • SCUBA

  • Referenced in 3 articles [sw09062]
  • Attestation in sensor networks. This paper presents SCUBA (Secure Code Update By Attestation), for detecting ... protocol enables the design of a sensor network that can detect compromised nodes without false ... represents a promising approach for designing secure sensor networks by proposing a first approach...
  • GridSec

  • Referenced in 4 articles [sw01927]
  • Trusted grid computing with security binding and self-defense against network worms and DDoS attacks ... self-defense capabilities to secure wide-area networked resource sites participating in a Grid application ... report new developments in trust modeling, security-binding methodology, and defense architecture against intrusions, worms ... novel architectural design of Grid security infrastructure, security binding for enhanced Grid efficiency, distributed collaborative...
  • Network Security Policy Verification

  • Referenced in 1 article [sw32204]
  • Network security policy verification: We present a unified theory for verifying network security policies ... formalization of stateful connection semantics in network security mechanisms. An algorithm to compute a secure ... Examples, ranging from an aircraft cabin data network to the analysis of a large real ... fully automated translation of high-level security goals to both firewall and SDN configurations...
  • Cognition

  • Referenced in 1 article [sw11314]
  • reinforcing security in software defined networks. Security is one of the most important requirements ... Networking offers to network managers new opportunities for deploying efficient security mechanisms. By means ... able to provide a highly reactive network security monitoring, to perform comprehensive traffic analysis ... applied in Autonomic Managers Networks (AMNs), can efficiently enable secure and safe SDN scenarios...
  • Charlotte

  • Referenced in 10 articles [sw30253]
  • wide area networks due to issues such as heterogeneity, security, and administrative boundaries. We present...
  • MiniCPS

  • Referenced in 1 article [sw26654]
  • MiniCPS: A toolkit for security research on CPS Networks. In recent years, tremendous effort ... research has been conducted on network security of office and home networks, recently the security ... world CPS are often not open to security researchers, and as a result very ... Mininet to provide lightweight real-time network emulation, and extends Mininet with tools to simulate...
  • JCSP

  • Referenced in 3 articles [sw25045]
  • connect to each other. Distributed JCSP networks may securely evolve, as components join and leave ... Server (CNS) -- using standard JCSP processes and networking. These may impose user-defined control over...
  • GARNET

  • Referenced in 1 article [sw22308]
  • Attack graphs enable computation of important network security metrics by revealing potential attack paths ... adversary could use to gain control of network assets. This paper presents GARNET (Graphical Attack ... attacker and of host-to-host network reachability that enables these exploits. It allows users ... attacker effort to compare the security of complex networks. For adversaries with three skill levels...