Evaluating the security of a computer network system is a challenging task. Configurations of large systems are com-plex entities in continuous evolution. The installation of new software, a change in the firewall rules, or the discovery of a software vulnerability can be exploited by a malicious user to gain unauthorized control of the integrity, availability and confidentiality of the assets of an organization. This paper presents a framework for building security as-sessment tools able to perform online verification of the se-curity of a system configuration. Heterogeneous data gen-erated from multiple sources are integrated into a homoge-neous RDF representation using domain-specific ontologies and used for assessing the security of a c...
Network Access Control requirements are typically implemented in practice as a series of heterogeneo...
The pervasiveness of information technologies has reached very high levels: most human activities in...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
AbstractAs the computer network has evolved to provide the user many services, the attacks on these ...
The integration of networks within an organization made many critical infrastructures (CI) and their...
Software systems have become highly distributed and complex involving independent components working...
We first consider network security services and then review threats, vulnerabilities and failure mo...
A major advantage of service-based computing technology is the ability to enable rapid formation of ...
Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of th...
Abstract: The security configuration of large networked ICT systems is a difficult and error-prone t...
Software systems become increasingly distributed, involving many independent and collaborating compo...
Software systems become increasingly distributed, involving many independent and collaborating compo...
International audienceThe implementation of a network security policy requires the configuration of ...
An integrated security framework is proposed for detecting enterprise-wide network attacks. The prop...
Quick evolution, heterogeneity, interdependence between equipment, and many other factors induce hig...
Network Access Control requirements are typically implemented in practice as a series of heterogeneo...
The pervasiveness of information technologies has reached very high levels: most human activities in...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
AbstractAs the computer network has evolved to provide the user many services, the attacks on these ...
The integration of networks within an organization made many critical infrastructures (CI) and their...
Software systems have become highly distributed and complex involving independent components working...
We first consider network security services and then review threats, vulnerabilities and failure mo...
A major advantage of service-based computing technology is the ability to enable rapid formation of ...
Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of th...
Abstract: The security configuration of large networked ICT systems is a difficult and error-prone t...
Software systems become increasingly distributed, involving many independent and collaborating compo...
Software systems become increasingly distributed, involving many independent and collaborating compo...
International audienceThe implementation of a network security policy requires the configuration of ...
An integrated security framework is proposed for detecting enterprise-wide network attacks. The prop...
Quick evolution, heterogeneity, interdependence between equipment, and many other factors induce hig...
Network Access Control requirements are typically implemented in practice as a series of heterogeneo...
The pervasiveness of information technologies has reached very high levels: most human activities in...
One of the major cyber security challenges we face today is overcoming the current limits of securit...