Most modern computer systems are connected to the Internet. This brings many opportunities for revenue generation via e-commerce and information sharing, but also threats due to the exposure of these systems to malicious adversaries. Therefore, almost all organisations deploy security tools to improve overall detection capabilities. However, all security tools have limitations: they may fail to detect attacks, fail to uncover all vulnerabilities or generate alarms for non-malicious traffic or non-vulnerable code. Using terminology from signalling theory, we can state that security tools suffer from two types of failures: failure to correctly label a malicious event as malicious (False Negatives); and failure to correctly label a non-malicio...
Diverse layers of defence play an important role in the design of defence-in-depth architectures. Th...
In this paper we propose a philosophy and a model apparatus to assess web application security instr...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Defence-in-depth is a term often used in security literature to denote architectures in which multip...
Due to the constantly evolving nature of cyber threats and attacks, organisations see an ever-growin...
In this paper we describe the design of a new set of empirical studies we will run to test the gains...
This report presents the analysis of the detection capabilities of intrusion detection systems when ...
This work discusses the role of diversity as a mean towards secure monitoring and control. The intui...
The security gains of intrusion-tolerant systems are directly dependent on the assumption that syste...
The internet considered a tool that effectively ensures communication globally has been hindered by ...
We present an analysis of the diversity that exists in the rules and blacklisted IP addresses of the...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
Diversity is an important and valuable concept that has been adopted in many fields to reduce correl...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Despite the recent push towards security by design, most softwares and hardwares on the market still...
Diverse layers of defence play an important role in the design of defence-in-depth architectures. Th...
In this paper we propose a philosophy and a model apparatus to assess web application security instr...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Defence-in-depth is a term often used in security literature to denote architectures in which multip...
Due to the constantly evolving nature of cyber threats and attacks, organisations see an ever-growin...
In this paper we describe the design of a new set of empirical studies we will run to test the gains...
This report presents the analysis of the detection capabilities of intrusion detection systems when ...
This work discusses the role of diversity as a mean towards secure monitoring and control. The intui...
The security gains of intrusion-tolerant systems are directly dependent on the assumption that syste...
The internet considered a tool that effectively ensures communication globally has been hindered by ...
We present an analysis of the diversity that exists in the rules and blacklisted IP addresses of the...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
Diversity is an important and valuable concept that has been adopted in many fields to reduce correl...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Despite the recent push towards security by design, most softwares and hardwares on the market still...
Diverse layers of defence play an important role in the design of defence-in-depth architectures. Th...
In this paper we propose a philosophy and a model apparatus to assess web application security instr...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...