A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Case Study of Three Open Source Security Management Tools
[chapter]
2003
Integrated Network Management VIII
Three open source security management tools -Snort, Pakemon, and Argusare benchmarked against DARPA 1999 Intrusion Detection Evaluation Data Set. ...
The results show that different tools perform well under different attack categories; hence they can be run at the same time to increase the detection rate of attack instances. ...
ACKNOWLEDEGEMENTS The authors gratefully acknowledge the financial support of the Natural Sciences and Engineering Research Council of Canada. ...
doi:10.1007/978-0-387-35674-7_10
fatcat:76yugyorsrgcjov6rm74jjadci
A case study of three open source security management tools
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.
Three open source security management tools -Snort, Pakemon, and Argusare benchmarked against DARPA 1999 Intrusion Detection Evaluation Data Set. ...
The results show that different tools perform well under different attack categories; hence they can be run at the same time to increase the detection rate of attack instances. ...
ACKNOWLEDEGEMENTS The authors gratefully acknowledge the financial support of the Natural Sciences and Engineering Research Council of Canada. ...
doi:10.1109/inm.2003.1194165
fatcat:so5wfp6uobdepc3mchxx4fepzy
ReqPriSec: Security and Privacy aware Web-based Versatile Requirement Engineering Tool
2019
International Journal of Computer Applications
The "ReqPriSec" tool is tested and evaluated based on different parameters on E-voting case study. ...
There is a strong need of versatile and security-privacy aware RE tool to elicit, manage and specify requirement efficiently and in standardized format. ...
Case Study Based Evaluation This section present the result of evaluation which is carried out on "ReqPriSec" tool along with four open source RE tools. ...
doi:10.5120/ijca2019919071
fatcat:pes2xv6m3zfabobm3a5eqpizfm
Data Life Cycle: Towards a Reference Architecture
2020
International Journal of Advanced Trends in Computer Science and Engineering
and testing a security information and events system POC (Proof Of Concept) made up of a Big Data platform and open source security tools. ...
We validated the proposed architecture through a case study of a company that wants to manage the huge amount of information and events produced by all the IT infrastructure including designing, implementing ...
CASE STUDY In this section, we present a validation of the proposed architecture through a case study of a Company that we designated "Company" for confidentiality reasons. ...
doi:10.30534/ijatcse/2020/215942020
fatcat:rbnyq5fsv5hfpo2oknvet62t7y
On the Combination of Static Analysis for Software Security Assessment – A Case Study of an Open-Source e-Government Project
2021
Advances in Science, Technology and Engineering Systems
In this work, we reported a longitudinal case study of adopting SAST as a part of a humandriven security assessment for an open-source e-government project. ...
Our result shows that (1) while some SAST tools outperform others, it is possible to achieve better performance by combining more than one SAST tools and (2) SAST tools should be used towards a practical ...
Acknowledgement This paper is supported by Vietnam Ministry of Science and Technology under the project "Secured Open source-software Repository for E-Government", number KC.01.16/16-20. ...
doi:10.25046/aj0602105
fatcat:xrt5b3znwrhuxkffedzxqgkmfu
The AMASS Tool Platform: An Innovative Solution for Assurance and Certication of Cyber-Physical Systems
2020
Requirements Engineering: Foundation for Software Quality
This Platform is an open source solution that supports the main activities for assurance and certification. ...
The underlying activities can be complex and labour-intensive, thus practitioners need tools that facilitate them. We present the AMASS Tool Platform as an example of these tools. ...
We are also grateful to all the people that have contributed to the development of the AMASS Tool Platform. ...
dblp:conf/refsq/VaraPRG20
fatcat:lm5cnekdzvbcphtafexyoof7iq
On the combination of static analysis for software security assessment – a case study of an open-source e-government project
[article]
2021
arXiv
pre-print
In this work, we reported a longitudinal case study of adopting SAST as a part of a human-driven security assessment for an open-source e-government project. ...
Our result shows that (1) while some SAST tools out-perform others, it is possible to achieve better performance by combining more than one SAST tools and (2) SAST tools should be used towards a practical ...
Acknowledgement This work was co-funded under the Vietnam national project entitled "SOREG -Secured Open source-software Repository for E-Government". The project is led by MQ Solution 9 . ...
arXiv:2103.08010v2
fatcat:tqv4oj52yfg27hqfs3podcomuy
STORM - Collaborative Security Management Environment
[chapter]
2011
Lecture Notes in Computer Science
Identifying these weaknesses and exploiting advanced open-source technologies and interactive software tools, we propose a secure, collaborative environment (STORM) for the security management of ICS's ...
Organizations spend a lot of money and time to implement their security policy. ...
open source and freeware VA tools, installation guides, VA scenarios, case studies; the countermeasures proposed by the Risk management module; security corporate documentation i.e. security policies, ...
doi:10.1007/978-3-642-21040-2_23
fatcat:qmgepfhmgvdtffao7com65kxjy
An MADM risk-based evaluation-selection model of free-libre open source software tools
2016
International Journal of Technology, Policy and Management
Free-Libre Open Source Software (FLOSS) tools are free-cost license highly attractive to be implemented by organizations. ...
Reference to this paper should be made as follows: Mora, M., Marx Gómez, J., O'Connor, R.V. and Gelman, O. (2016) 'An MADM risk-based evaluation-selection model of free-libre open source software tools ...
Acknowledgments This research was supported by the PIINF14-3 grant provided by the Autonomous University of Aguascalientes for the period 2014-2015. ...
doi:10.1504/ijtpm.2016.10002522
fatcat:kotebj2x55gore7smfaqe6dxqa
Intrusion Detection using Open Source Tools
2008
Informatică economică
In this paper we will present three open source IDS tools: OSSEC, Prelude and SNORT. ...
We have witnessed in the recent years that open source tools have gained popularity among all types of users, from individuals or small businesses to large organizations and enterprises. ...
Snort (www.snort.org) is, without doubt, one of the most popular open source security tools. ...
doaj:20144e5f021845ec89ee9f892e260983
fatcat:ilxbelw2jzcndd2n37dtcggdvy
Cybersecurity Business Models for IoT-Mobile Device Management Services in Futures Digital Hospitals
2017
Journal of ICT Standardization
In this paper, we open up discussions on business possibilities relevant to Internet of Things-mobile device management for critical infrastructures such as future digital hospital. ...
We apply business models as a conceptual lens to analyze how cybersecurity business could evolve for 5G enabled IoT-Mobile device management providers as a cybersecurity vendor. ...
Acknowledgment This study has been supported by the DIMECC Cyber Trust -Digital cyber security program. ...
doi:10.13052/jicts2245-800x.516
fatcat:jcik3sgrgrd7doneiur2kxpi4y
A Big Data Lake for Multilevel Streaming Analytics
[article]
2020
arXiv
pre-print
We discuss and compare different open source and commercial platforms that can be used to develop a data lake. ...
This study can serve as a guide for individuals or organizations planning to implement a data lake solution for their use cases. ...
ACKNOWLEDGMENT We would like to express a special thanks to the Southern Ontario Smart Computing for Innovation Platform (SOSCIP), Ontario Centres of Excellence (OCE) and IBM Canada for supporting this ...
arXiv:2009.12415v1
fatcat:riscmxr55vaolj2or7izhgcrkm
VulnEx: Exploring Open-Source Software Vulnerabilities in Large Development Organizations to Understand Risk Exposure
[article]
2021
arXiv
pre-print
We show the applicability of our tool through a use case and preliminary expert feedback. ...
The prevalent usage of open-source software (OSS) has led to an increased interest in resolving potential third-party security risks by fixing common vulnerabilities and exposures (CVEs). ...
One participant acted as program manager for open-source security and DevSecOps, determining requirements, developing tools, and standardizing the secure consumption and publication of opensource components ...
arXiv:2108.06259v2
fatcat:rgc4ugtw3ncpzmqz4fcue6paiq
NoSQL security: can my data-driven decision-making be affected from outside?
[article]
2022
arXiv
pre-print
This chapter aims at examining the state of the security of open data databases representing both relational databases and NoSQL, with a particular focus on a later category. ...
One of these risks is posed by open data sources, by which are meant databases, which are not properly protected. ...
SEARCH ENGINE FOR THE INTERNET OF EVERYTHING AS A TOOL FOR DETECTING VULNERABLE OPEN DATA SOURCES Search Engine for the IoE-based tool called Shodan-and Binary Edge-based vulnerable open data sources detection ...
arXiv:2206.11787v1
fatcat:c7gkportkba6bnq372aktksqiy
A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints
2020
The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology
This study contributes new insights from security and functionality characteristics metrics to underscore the use and effectiveness of open source simulators. ...
Several open source simulators span applications in communications and wireless sensor networks, industrial control systems, and the Industrial Internet of Things. ...
Lastly, considering security as a key focus, the study also aimed to determine the open source tools that are characterized to address security-related simulation scenarios, and to understand the specific ...
doi:10.1177/1548512920953499
fatcat:d47gxkzznveoplad3ssofo3k5i
« Previous
Showing results 1 — 15 out of 413,205 results