This paper is based on a conceptual framework in which security can be split into two generic types of characteristics, behavioral and preventive. Here, preventive security denotes the system’s ability to protect itself from external attacks. One way to describe the preventive security of a system is in terms of its interaction with the alleged attacker, i.e., by describing the intrusion process. To our knowledge, very little is done to model this process in quantitative terms. Therefore, based on empirical data collected from intrusion experiments, we have worked out a hypothesis on typical attacker behavior. The hypothesis suggests that the attacking process can be split into three phases: the learning phase, the standard attack phase and...
Software based systems are ubiquitous in modern day operations. There has been an increase\ud in sof...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Modern systems transition towards more connected, information and communication technologies (ICT) h...
This paper is based on a conceptual framework in which security can be split into two generic types ...
This paper is based on a conceptual framework in which security can be split into two generic types ...
This paper describes a security model developed from empirical data collected from a realistic intru...
This paper describes a security model developed fromempirical data collected from a realistic intrus...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
This paper describes a realistic intrusion experiment intended to investigate whether such experimen...
The first part of this thesis describes the results of applying dependability methods to the securit...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
The two experiments described here were intended to investigate the empirical issues that arise from...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of...
In most contexts, it is not feasible to guarantee that a system is 100 % secure. Measures and predic...
Software based systems are ubiquitous in modern day operations. There has been an increase\ud in sof...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Modern systems transition towards more connected, information and communication technologies (ICT) h...
This paper is based on a conceptual framework in which security can be split into two generic types ...
This paper is based on a conceptual framework in which security can be split into two generic types ...
This paper describes a security model developed from empirical data collected from a realistic intru...
This paper describes a security model developed fromempirical data collected from a realistic intrus...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
This paper describes a realistic intrusion experiment intended to investigate whether such experimen...
The first part of this thesis describes the results of applying dependability methods to the securit...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
The two experiments described here were intended to investigate the empirical issues that arise from...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of...
In most contexts, it is not feasible to guarantee that a system is 100 % secure. Measures and predic...
Software based systems are ubiquitous in modern day operations. There has been an increase\ud in sof...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Modern systems transition towards more connected, information and communication technologies (ICT) h...