Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to an organisation. This paper discusses an a...
Firewalls are key components in network security architectures. A firewall controls the access into and from the network based on a set of predefined...
This paper describes a new interactive method to analyse knowledge of participants involved in security protocols and further to verify the correctnes...
In this paper, we present a framework design and implementation that provides a scalable solution for two important components of alert correlation: a...
User-identification and key distribution with preserving anonymity is an important issue for remote access. Yang et al. proposed an efficient user ide...