Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Bastian Hellmann"'
Publikováno v:
IDAACS
Intrusion detection systems and other network security components detect security-relevant events based on policies consisting of rules. If an event turns out as a false alarm, the corresponding policy has to be adjusted in order to reduce the number
Publikováno v:
IDAACS
A problem in managing the ever growing computer networks nowadays is the analysis of events detected by intrusion detection systems and the classification whether an event was correctly detected or not. When a false positive is detected by the user,
Autor:
Volker Ahlers, Bastian Hellmann, Felix Heine, Carsten Kleiner, Thomas Rossow, Ralf Steuerwald, Leonard Renners
Publikováno v:
Graphical Models for Security ISBN: 9783319299679
GraMSec@CSF
GraMSec@CSF
In computer networks many components produce valuable information about themselves or other participants, especially security analysis relevant information. Although such information is intrinsically related as components are connected by a network,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::45a738b997258862e6dae092783eae97
https://doi.org/10.1007/978-3-319-29968-6_2
https://doi.org/10.1007/978-3-319-29968-6_2
Publikováno v:
IDAACS
The threat of cyber-attacks grows up, as one can see by several negative security-news from companies and private persons. [7] Especially small-and-medium-sized enterprises (SME) are in focus of external attackers because they have not implemented su
Publikováno v:
Advances in Swarm and Computational Intelligence ISBN: 9783319204710
ICSI (2)
ICSI (2)
The threat of cyber-attacks grows up, as one can see by several negative security news and reports [8]. Today there are many security components (e.g. anti-virus-system, firewall, and IDS) available to protect enterprise networks; unfortunately, they
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::061fe7bb6e33a8a4057357224825dace
https://doi.org/10.1007/978-3-319-20472-7_48
https://doi.org/10.1007/978-3-319-20472-7_48
Publikováno v:
NBiS
In this paper we present an approach to add Remote Attestation capabilities to the Google Chrome OS platform. Our approach is based on the combination of two integral aspects of Chrome OS: (1) its Verified Boot procedure and (2) its extensible, app-b
Publikováno v:
NBiS
In this paper we propose a novel, network-based, distributed anomaly detection framework for smart phones. Our approach is based upon the distributed collection of arbitrary, static and dynamic smart phone features. Our approach is not limited to fea
Publikováno v:
ISSE 2011 Securing Electronic Business Processes ISBN: 9783834819116
The ESUKOM project aims to develop a real-time security solution for enterprise networks that works based upon the correlation of metadata. The ESUKOM approach focuses on the integration of available and widely deployed security tools (both commercia
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e66e5a0e61fa783db5ecf587b6609923
https://doi.org/10.1007/978-3-8348-8652-1_33
https://doi.org/10.1007/978-3-8348-8652-1_33
Publikováno v:
Trusted Systems ISBN: 9783642252822
This paper describes an approach to perform a Remote Attestation in VPN environments, using Trusted Network Connect techniques. The solution is based on the VPN connection set up to authenticate the user, and the afterwards established VPN tunnel to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::20391f8fb81f1adfe65754c18e7534da
https://doi.org/10.1007/978-3-642-25283-9_20
https://doi.org/10.1007/978-3-642-25283-9_20
Autor:
Gabi Dreo, Joerg Vieweg, Johannes Westhuis, Ingo Bente, Stephan Heuser, Josef von Helden, Bastian Hellmann
Publikováno v:
Trust and Trustworthy Computing ISBN: 9783642215988
We propose a new attestation approach for the Android platform that integrates Trusted Computing concepts and Android's permission-based access control features. Recent research in the field of mobile security has shown that malware is a real threat.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3822ddbd882eb181f02e082373eda3aa
https://doi.org/10.1007/978-3-642-21599-5_8
https://doi.org/10.1007/978-3-642-21599-5_8