51 Hits in 7.8 sec

Network attack detection and defense – Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008

Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut Koenig, Christopher Kruegel, Pavel Laskov
2009 Computer Science - Research and Development  
This manifesto is the result of the Perspective Workshop Network Attack Detection and Defense held in Schloss Dagstuhl (Germany) from March 2nd-6th, 2008.  ...  Abstract This manifesto is the result of the Perspective Workshop Network Attack Detection and Defense held in Schloss Dagstuhl (Germany) from March 2nd-6th, 2008.  ...  He has been co-organizing conferences and workshops of IEEE,  ... 
doi:10.1007/s00450-009-0055-y fatcat:rqjse3zyqrg53iv2o5twwak46q

Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302)

Zinaida Benenson, Marianne Junger, Daniela Oliveira, Gianluca Stringhini, Michael Wagner
2019 Dagstuhl Reports  
Through five days of brainstorming and discussion, the participants developed a roadmap for future research on these topics, along four directions: modelling the attackers, measuring human behavior, detection  ...  Seminar July 21-26, 2019 - 2012 ACM Subject Classification Social and professional topics → Computer crime, Security and privacy → Human and societal aspects of security and  ...  Another research question that I am interested in and is related to the theme of the workshop is: As fake news has been around even before the internet, can we learn from how the history has dealt with  ... 
doi:10.4230/dagrep.9.7.117 dblp:journals/dagstuhl-reports/BenensonJOS19 fatcat:zpxov2sgzfhppdnrz662uckcx4

Socio-Technical Security Metrics (Dagstuhl Seminar 14491)

Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela Sasse, Marc Herbstritt
2015 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics".  ...  In this seminar, we searched for suitable metrics that allow us to estimate information security risk in a socio-technical context, as well as the costs and effectiveness of countermeasures.  ...  To this end, as future work, we intend to use a case study in order to further investigate the interactions between design science and security metrics.  ... 
doi:10.4230/dagrep.4.12.1 dblp:journals/dagstuhl-reports/GollmannHKPS14 fatcat:j22tyed5nnbcbfm42od2kh5pki

Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331)

Bjorn De Sutter, Christian Collberg, Mila Dalla Preda, Michael Wagner
2019 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 19331 "Software Protection Decision Support and Evaluation Methodologies".  ...  Within this domain, the seminar focused mainly on three aspects: 1) how to evaluate newly proposed protections and attackers thereon; 2) how to create an appropriate benchmark suite to be used in such  ...  The organizers of this workshop, and many experts in their network, consider the lack of automated decision support for selecting the best protections, and the lack of a generally accepted, broadly applicable  ... 
doi:10.4230/dagrep.9.8.1 dblp:journals/dagstuhl-reports/SutterCPW19 fatcat:guwem6swfjf3hm4qaqcfkc6phi

8. 08102 Manifesto – Perspectives Workshop: Network Attack Detection and Defense

Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut Koenig, Christopher Kruegel, Pavel Laskov, Hartmut König
This manifesto is the result of the Perspective Workshop Network Attack Detection and Defense held in Schloss Dagstuhl (Germany) from March 2nd – 6th, 2008.  ...  The workshop participants considered various perspectives to envision future network attack detection and defense.  ...  Objectives The objective of the Perspective Workshop Network Attack Detection and Defense was to discuss future challenges in reactive security, in particular in intrusion detection and flow analysis.  ... 
doi:10.4230/dagsemproc.08102.8 fatcat:rguuh46yyvhjjflfqfyytowvum

Dagstuhl Perspective Workshop 08102

Georg Carle, Tanja Zseby, Tobias Limmer, Marc Dacier, Pavel Laskov, Anja Feldmann, Joachim Biskup, Michael Meier, Peter Herrmann, James Sterbenz, Christopher Kruegel, Stephan Wolthusen (+5 others)
Executive Summary From March 2 nd to 6 th , 2008, the Dagstuhl Perspective Workshop 08102 Network Attack Detection and Defense was held at the International Conference and Research Center (IBFI), Schloss  ...  Abstracts of the presentations given during the workshop , the outcomes of the working groups, and the manifesto are put together in the online proceedings.  ...  detection for web services Dagstuhl Seminar Proceedings 08102 Perspectives Workshop: Network Attack Detection and Defense  ... 

Electronic Markets and Auctions (Dagstuhl Seminar 13461) Computational Models of Language Meaning in Context (Dagstuhl Seminar 13462) Synchronous Programming (Dagstuhl Seminar 13471) Global Measurement Framework (Dagstuhl Seminar 13472) Unleashing Operational Process Mining (Dagstuhl Seminar 13481) Forensic Computing (Dagstuhl Seminar 13482)

Saul Greenberg, Kasper Hornbaek, Aaron Quigley, Harald Reiterer, Roman, Yishay Mansour, Benny Moldovanu, Noam Nisan, Berthold, Hans Kamp, Alessandro Lenci, James (+14 others)
2013 unpublished
Two EC FP7 research projects, Leone and mPlane, kindly supported the social event of the seminar.  ...  The seminar can be seen as a good starting point to identify the role of Proxemics in Human-Computer Interaction.  ...  Proceedings of the ACM 2008 conference on Computer supported cooperative work, ACM (2008), 17-26.  ... 

Symmetric Cryptography (Dagstuhl Seminar 12031) Learning in Multiobjective Optimization (Dagstuhl Seminar 12041) Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051)

Robert Hirschfeld, Shriram Krishnamurthi, Jan, Verónica Becher, Laurent Bienvenu, Rodney Downey, Elvira Mayordomo, Frederik Armknecht, Stefan Lucks, Bart Preneel, Phillip Rogaway, Salvatore Greco (+6 others)
2012 Foundations for Scripting Languages   unpublished
Acknowledgments Many thanks to the Dagstuhl office and its helpful and patient staff; huge thanks to the organizers of the previous seminars in the series for setting us up for success; and thanks to all  ...  the participants, who worked hard and were amiable company all week.  ...  As witnessed by the three seminars previously organized in Dagstuhl on complexity and randomness (Seminar 9318, Descriptional complexity: a multidisciplinary perspective in 1993; Seminar 03181, Centennial  ... 

Human Activity Recognition in Smart Environments (Dagstuhl Seminar 12492) Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501) Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502) Divide and Conquer: the Quest for Compositional Design and Analysis (Dagstuhl Seminar 12511) Representation, Analysis and Visualization of Moving Objects (Dagstuhl Seminar 12512)

Susanne Biundo-Stephan, Hans Guesgen, Joachim Hertzberg, Stephen, James Crowley, Kai Kunze, Paul Lukowicz, Albrecht Schmidt, Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert (+11 others)
2012 unpublished
Initial ideas about data challenges and benchmarking in movement analysis came out of the predecessor Dagstuhl seminars Nr. 08451 in 2008 and Nr. 10491 in 2010.  ...  to this category of threat that we had gained from the 2008 and 2010 Dagstuhl seminars on insider threats (Countering Insider Threats, #08302, and Insider Threats: Strategies for Prevention, Mitigation  ...  in their network like interactions.  ... 

Biggest Failures in Security (Dagstuhl Seminar 19451)

Frederik Armknecht, Ingrid Verbauwhede, Melanie Volkamer, Moti Yung
The idea of the Dagstuhl Seminar was to go one step back and to follow a comprehensive top-down approach instead.  ...  To this end, the Dagstuhl Seminar was roughly divided into two parts. First, experienced experts from different disciplines gave overview talks on the main problems of their field.  ...  Dagstuhl Seminar 16361: Network Attack Detection and Defense: Security Challenges and Opportunities of Software- Defined Networking, September 2016. 4 Marc Dacier, Hartmut König, Radoslaw Cwalinski,  ... 
doi:10.5445/ir/1000118000 fatcat:ixvkkkhsoravdlklbcxinvjvxm

Network Attack Detection and Defense Early Warning Systems-Challenges and Perspectives (Dagstuhl Seminar 12061) Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071) Information Visualization, Visual Data Mining and Machine Learning (Dagstuhl Seminar 12081) Principles of Provenance (Dagstuhl Seminar 12091)

Georg Carle, Hervé Debar, Falko Dressler, Hartmut König, Rainer Koschke, Ira Baxter, Michael Conradt, James Cordy, Daniel Keim, Fabrice Rossi, Thomas Seidl, Michel Verleysen (+5 others)
2012 unpublished
Acknowledgements My thanks to various business groups within TCS and my lab head Mr. Arun Bahulkar for the intense discussions and feedback on the software system's problems.  ...  URL License 2 0 6 1 2 0 6 1 -Network Attack Detection and Defense EWS -Challenges and Perspectives 2 0 6 1 2 0 7 1 -Software Clone  ...  It gave a good opportunity to inform about current challenges in the area of network attack detection and defense and discuss possible countermeasures.  ... 

Coalgebraic Logics (Dagstuhl Seminar 12411) Algebraic and Combinatorial Methods in Computational Complexity (Dagstuhl Seminar 12421) Time-of-Flight Imaging: Algorithms, Sensors and Applications (Dagstuhl Seminar 12431) Foundations and Challenges of Change and Evolution in Ontologies (Dagstuhl Seminar 12441) Requirements Management-Novel Perspectives and Challenges (Dagstuhl Seminar 12442)

Lieven Desmet, Martin Johns, Benjamin Livshits, Andrei Sabelfeld, Ernst-Erich Doberkat, Alexander Kurz, Manindra Agrawal, Thomas Thierauf, Christopher Umans, James Davis, Bernd Jähne, Andreas Kolb (+9 others)
2012 unpublished
We review the requirements problem as defined by Jackson and Zave [2]. We then discuss how computational complexity creeps in and how to cope with it.  ...  The seminar thus built and expanded on some of the critical themes that had been brought up five years earlier in two NSF-sponsored workshops in Cleveland [5] and Dagstuhl [4] , [3] .  ...  Detecting hidden storage side channel vulnerabilities in networked applications.  ... 

50 Algebra in Computational Complexity (Dagstuhl Seminar 14391) Manindra Agrawal, Valentine Kabanets, Thomas Thierauf, and Christopher Umans 85 Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop

Maria-Florina Balcan, Bodo Manthey, Heiko Röglin, Tim Roughgarden, Artur D'avila Garcez, Marco Gori, Pascal Hitzler, Luís Lamb, Bart Preneel, Phillip Rogaway, Mark Ryan, Peter (+5 others)
this Dagstuhl seminar marking the 10th anniversary of the workshop.  ...  We formalize security notions to capture this goal and then offer both attacks and defenses.  ...  The proposed seminar also builds on the Dagstuhl Perspective Workshop 12212 Co-Design of Systems and Applications for Exascale, which also relates to the DFG-funded project FFMK (  ... 

Analysis of Dynamic Social and Technological Networks (Dagstuhl Seminar 11452) Coding Theory (Dagstuhl Seminar 11461)

Holger Giese, Bernhard Rumpe, Bernhard Schätz, Janos Sztipanovits, Lars Elden, Andreas, Vito Latora, Cecilia Mascolo, Mirco, Joachim Rosenthal, M Shokrollahi, Judy
2011 Science and Engineering of Cyber-Physical Systems   unpublished
This motivates our interest in M@RT, and especially in continuous re-appraisal of requirements at run-time, which calls for effective and light-way methods for model representation and reasoning at run-time  ...  ., TOSEM'97, and a more recent one by Jureta et al., RE'08), as a dynamic problem (Qureshi at al., CAISE'11).  ...  The participants of this seminar had a chance to interact with the Dagstuhl seminar 11542 "Analysis of Dynamic Social and Technological Networks" held at the same time.  ... 

Connecting Performance Analysis and Visualization to Advance Extreme Scale Computing (Dagstuhl Seminar 14022) Randomized Timed and Hybrid Models for Critical Infrastructures (Dagstuhl Seminar 14031) Planning with Epistemic Goals (Dagstuhl Seminar 14032)

Frederik Armknecht, Helena Handschuh, Tetsu Iwata, Bart, Bernd Bremer, Valerio Mohr, Martin Pascucci, Schulz, Erika Ábrahám, Alberto Avritzer, Anne Remke, William Sanders (+13 others)
2014 unpublished
Note that the seed metaphor is a particularly interesting one in the context of DIY networking, and actually our Dagstuhl seminar was conceived more as a seed for future collaborations than a workshop  ...  PMUs (phasor measurement units) and bad data detection algorithms (GPS spoofing attack).  ...  Facebook's Tastes, ties and Time project and the release of data in 2008.  ... 
« Previous Showing results 1 — 15 out of 51 results