• Datalog

  • Referenced in 292 articles [sw20023]
  • data integration, information extraction, networking, program analysis, security, and cloud computing.[1] Its origins date...
  • SPINS

  • Referenced in 49 articles [sw02657]
  • focused on making these networks feasible and useful, security has received little attention. We present ... suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks ... easily matches the data rate of our network. Additionally, we demonstrate that the suite...
  • IRIS

  • Referenced in 13 articles [sw19373]
  • strategic security allocation in transportation networks. Security is a concern of major importance to governments...
  • MulVAL

  • Referenced in 8 articles [sw17743]
  • MulVAL: A Logic-based Network Security Analyzer. To determine the security impact software vulnerabilities have...
  • FIREMAN

  • Referenced in 7 articles [sw10594]
  • modeling and analysis. Security concerns are becoming increasingly critical in networked ... systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are very common ... significantly weaken the desired security. This paper introduces FIREMAN, a static analysis toolkit for firewall ... uncover several real misconfigurations in enterprise networks, some of which have been subsequently confirmed...
  • scyther

  • Referenced in 16 articles [sw09467]
  • Internet and other open networks, a large number of security protocols have been developed...
  • eHIP

  • Referenced in 4 articles [sw01490]
  • delivered data is indispensable for security-sensitive Wireless Sensor Networks (WSN). Unfortunately, conventional security approaches ... messages and sensed data. However, because the security threat from compromised sensor nodes cannot ... proposed to balance the tradeoff between network security and energy efficiency. In order to evaluate...
  • BotGraph

  • Referenced in 4 articles [sw21754]
  • BotGraph: large scale spamming botnet detection. Network security applications often require analyzing huge volumes...
  • RADA

  • Referenced in 4 articles [sw20732]
  • messages should be allowed to cross network security domains. Promising experimental results demonstrate that RADA...
  • NodeXL

  • Referenced in 7 articles [sw04183]
  • grouping, and simplification The growing importance of network analysis has increased attention on interactive exploration ... business, legal, scientific, or national security decisions. Since networks are often complex and cluttered, strategies...
  • Plutus

  • Referenced in 10 articles [sw22497]
  • achieves strong security with overhead comparable to systems that encrypt all network traffic...
  • Firmato

  • Referenced in 12 articles [sw10595]
  • global knowledge of the security policy and of the network topology; (2) a model definition...
  • SCUBA

  • Referenced in 3 articles [sw09062]
  • Attestation in sensor networks. This paper presents SCUBA (Secure Code Update By Attestation), for detecting ... protocol enables the design of a sensor network that can detect compromised nodes without false ... represents a promising approach for designing secure sensor networks by proposing a first approach...
  • GridSec

  • Referenced in 4 articles [sw01927]
  • Trusted grid computing with security binding and self-defense against network worms and DDoS attacks ... self-defense capabilities to secure wide-area networked resource sites participating in a Grid application ... report new developments in trust modeling, security-binding methodology, and defense architecture against intrusions, worms ... novel architectural design of Grid security infrastructure, security binding for enhanced Grid efficiency, distributed collaborative...
  • Network Security Policy Verification

  • Referenced in 1 article [sw32204]
  • Network security policy verification: We present a unified theory for verifying network security policies ... formalization of stateful connection semantics in network security mechanisms. An algorithm to compute a secure ... Examples, ranging from an aircraft cabin data network to the analysis of a large real ... fully automated translation of high-level security goals to both firewall and SDN configurations...
  • Lilliput

  • Referenced in 15 articles [sw20153]
  • such schemes called Extended Generalized Feistel Networks well suited for cryptographic applications. We instantiate this ... lightweight block cipher called Lilliput analyzing its security and its hardware performances...
  • Gazelle

  • Referenced in 2 articles [sw38099]
  • Gazelle: A Low Latency Framework for Secure Neural Network Inference. The growing popularity of cloud ... scalable and low-latency system for secure neural network inference, using an intricate combination...
  • Cognition

  • Referenced in 1 article [sw11314]
  • reinforcing security in software defined networks. Security is one of the most important requirements ... Networking offers to network managers new opportunities for deploying efficient security mechanisms. By means ... able to provide a highly reactive network security monitoring, to perform comprehensive traffic analysis ... applied in Autonomic Managers Networks (AMNs), can efficiently enable secure and safe SDN scenarios...
  • SDSNM

  • Referenced in 1 article [sw38853]
  • SDSNM: A Software-Defined Security Networking Mechanism to Defend against DDoS Attacks. The Distributed Denial ... network architecture. Then a software-defined security networking mechanism (SDSNM) was proposed to remove...
  • Charlotte

  • Referenced in 10 articles [sw30253]
  • wide area networks due to issues such as heterogeneity, security, and administrative boundaries. We present...