![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
21st USENIX Security Symposium 2012: Bellevue, WA, USA - CSET
- Sean Peisert, Stephen Schwab:
5th Workshop on Cyber Security Experimentation and Test, CSET '12, Bellevue, WA, USA, August 6, 2012. USENIX Association 2012
Testbed Technology for Cyber Security
- Michael Rosenstein, Frank Corvese:
A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed. - Jelena Mirkovic, Abdulla Alwabel, Ted Faber:
Beyond Disk Imaging for Preserving User State in Network Testbeds. - Olaf Maennel, Iain Phillips, Debbie Perouli, Randy Bush, Rob Austein, Askar Jaboldinov:
Towards a Framework for Evaluating BGP Security.
Malware and Attacks
- Anas AlMajali, Arun Viswanathan, Clifford Neuman:
Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack. - Tamas K. Lengyel, Justin Neumann, Steve Maresca, Bryan D. Payne, Aggelos Kiayias:
Virtual Machine Introspection in a Hybrid Honeypot Architecture. - Marie Vasek, Tyler Moore:
Do Malware Reports Expedite Cleanup? An Experimental Study.
Anonymity and Privacy
- John F. Duncan, L. Jean Camp:
Conducting an Ethical Study of Web Traffic. - Rob Jansen, Kevin S. Bauer, Nicholas Hopper, Roger Dingledine:
Methodically Modeling the Tor Network. - Sandy Clark, Chris Wacek, Matt Blaze, Boon Thau Loo
, Micah Sherr, Clay Shields, Jonathan M. Smith:
Collaborative Red Teaming for Anonymity System Evaluation.
Games and Studies in Academic Environments
- Roya Ensafi, Mike Jacobi, Jedidiah R. Crandall:
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper. - Sebastian Koch, Jörg Schneider, Jan Nordholz:
Disturbed Playing: Another Kind of Educational Security Games. - Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Learning from Early Attempts to Measure Information Security Performance.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.