Zobrazeno 1 - 10
of 64
pro vyhledávání: '"Errin W. Fulp"'
Publikováno v:
2023 International Conference on Computing, Networking and Communications (ICNC).
Publikováno v:
ISNCC
Illicitly-registered subdomains are often trusted by users since they typically inherit the trust and reputation of their parent (apex) domains. This trust can be leveraged by attackers to deliver malware, obtain credentials, or redirect users to exp
Autor:
Errin W. Fulp, Bryan Prosser
Publikováno v:
ACSOS
Many mobile agent systems rely on a population of software agents roaming a network of nodes (visitation sites) performing various tasks, such as monitoring security or measuring connectivity. For these systems, the number of agents in the population
Publikováno v:
GECCO Companion
Interconnected devices require different types of network access to maintain functionality; however, access must also be limited to ensure security. Virtual Local Area Networks (VLANs) have become a core technology for securely interconnecting device
Publikováno v:
ICC
Domain shadowing is the introduction of an illegitimate subdomain under a preexisting legitimate domain. Attackers benefit not only from the inconspicuous nature of these subdomains, but also from the trust associated with the legitimate domain. Clas
With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative co
Autor:
Errin W. Fulp, Ruidan Li
Publikováno v:
TrustCom/BigDataSE
The efficient management (placement and orientation) of surveillance cameras within a floor plan is a well-known and difficult problem that has regained attention. The objective is to locate the minimum number of cameras in a physical space to ensure
Autor:
H. Donald Gage, Errin W. Fulp
Publikováno v:
TrustCom/BigDataSE
Configurations provide the ability to adjust the behavior of software for a specific deployment; however, ensuring the configuration yields a functional and secure system can be problematic. Configurations can consist of a large number of parameters
Autor:
Ruidan Li, Errin W. Fulp
Publikováno v:
IEEE Symposium on Security and Privacy Workshops
The efficient management (placement and orientation) of security cameras within a floor plan is a well-known and difficult problem that has gained attention recently. The objective is to locate the minimum number of cameras in the space to ensure all
Publikováno v:
IEEE Symposium on Security and Privacy Workshops
Many computer performance and security issues can be attributed to poor software configuration settings (misconfigurations). However, finding and resolving errors is complicated by the number of parameters to set and the complexity (unsuspected inter