A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Network attack detection and defense – Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008
2009
Computer Science - Research and Development
This manifesto is the result of the Perspective Workshop Network Attack Detection and Defense held in Schloss Dagstuhl (Germany) from March 2nd-6th, 2008. ...
Abstract This manifesto is the result of the Perspective Workshop Network Attack Detection and Defense held in Schloss Dagstuhl (Germany) from March 2nd-6th, 2008. ...
He has been co-organizing conferences and workshops of IEEE, ...
doi:10.1007/s00450-009-0055-y
fatcat:rqjse3zyqrg53iv2o5twwak46q
Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302)
2019
Dagstuhl Reports
Through five days of brainstorming and discussion, the participants developed a roadmap for future research on these topics, along four directions: modelling the attackers, measuring human behavior, detection ...
Seminar July 21-26, 2019 -http://www.dagstuhl.de/19302 2012 ACM Subject Classification Social and professional topics → Computer crime, Security and privacy → Human and societal aspects of security and ...
Another research question that I am interested in and is related to the theme of the workshop is: As fake news has been around even before the internet, can we learn from how the history has dealt with ...
doi:10.4230/dagrep.9.7.117
dblp:journals/dagstuhl-reports/BenensonJOS19
fatcat:zpxov2sgzfhppdnrz662uckcx4
Socio-Technical Security Metrics (Dagstuhl Seminar 14491)
2015
Dagstuhl Reports
This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". ...
In this seminar, we searched for suitable metrics that allow us to estimate information security risk in a socio-technical context, as well as the costs and effectiveness of countermeasures. ...
To this end, as future work, we intend to use a case study in order to further investigate the interactions between design science and security metrics. ...
doi:10.4230/dagrep.4.12.1
dblp:journals/dagstuhl-reports/GollmannHKPS14
fatcat:j22tyed5nnbcbfm42od2kh5pki
Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331)
2019
Dagstuhl Reports
This report documents the program and the outcomes of Dagstuhl Seminar 19331 "Software Protection Decision Support and Evaluation Methodologies". ...
Within this domain, the seminar focused mainly on three aspects: 1) how to evaluate newly proposed protections and attackers thereon; 2) how to create an appropriate benchmark suite to be used in such ...
The organizers of this workshop, and many experts in their network, consider the lack of automated decision support for selecting the best protections, and the lack of a generally accepted, broadly applicable ...
doi:10.4230/dagrep.9.8.1
dblp:journals/dagstuhl-reports/SutterCPW19
fatcat:guwem6swfjf3hm4qaqcfkc6phi
8. 08102 Manifesto – Perspectives Workshop: Network Attack Detection and Defense
2008
This manifesto is the result of the Perspective Workshop Network Attack Detection and Defense held in Schloss Dagstuhl (Germany) from March 2nd – 6th, 2008. ...
The workshop participants considered various perspectives to envision future network attack detection and defense. ...
Objectives The objective of the Perspective Workshop Network Attack Detection and Defense was to discuss future challenges in reactive security, in particular in intrusion detection and flow analysis. ...
doi:10.4230/dagsemproc.08102.8
fatcat:rguuh46yyvhjjflfqfyytowvum
Dagstuhl Perspective Workshop 08102
unpublished
Executive Summary From March 2 nd to 6 th , 2008, the Dagstuhl Perspective Workshop 08102 Network Attack Detection and Defense was held at the International Conference and Research Center (IBFI), Schloss ...
Abstracts of the presentations given during the workshop , the outcomes of the working groups, and the manifesto are put together in the online proceedings. ...
detection for web services
Dagstuhl Seminar Proceedings 08102 Perspectives Workshop: Network Attack Detection and Defense http://drops.dagstuhl.de/opus/volltexte/2008/1492 ...
fatcat:pdrbjfailjbshgxecfqi2thgiy
Electronic Markets and Auctions (Dagstuhl Seminar 13461) Computational Models of Language Meaning in Context (Dagstuhl Seminar 13462) Synchronous Programming (Dagstuhl Seminar 13471) Global Measurement Framework (Dagstuhl Seminar 13472) Unleashing Operational Process Mining (Dagstuhl Seminar 13481) Forensic Computing (Dagstuhl Seminar 13482)
2013
unpublished
Two EC FP7 research projects, Leone and mPlane, kindly supported the social event of the seminar. ...
The seminar can be seen as a good starting point to identify the role of Proxemics in Human-Computer Interaction. ...
Proceedings of the ACM 2008 conference on Computer supported
cooperative work, ACM (2008), 17-26. ...
fatcat:fl5xhx4dpbeklg6o6xhmuvuety
Symmetric Cryptography (Dagstuhl Seminar 12031) Learning in Multiobjective Optimization (Dagstuhl Seminar 12041) Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051)
2012
Foundations for Scripting Languages
unpublished
Acknowledgments Many thanks to the Dagstuhl office and its helpful and patient staff; huge thanks to the organizers of the previous seminars in the series for setting us up for success; and thanks to all ...
the participants, who worked hard and were amiable company all week. ...
As witnessed by the three seminars previously organized in Dagstuhl on complexity and randomness (Seminar 9318, Descriptional complexity: a multidisciplinary perspective in 1993; Seminar 03181, Centennial ...
fatcat:avothr4qzfbxlbs2hgjdkccu2i
Human Activity Recognition in Smart Environments (Dagstuhl Seminar 12492) Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501) Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502) Divide and Conquer: the Quest for Compositional Design and Analysis (Dagstuhl Seminar 12511) Representation, Analysis and Visualization of Moving Objects (Dagstuhl Seminar 12512)
2012
unpublished
Initial ideas about data challenges and benchmarking in movement analysis came out of the predecessor Dagstuhl seminars Nr. 08451 in 2008 and Nr. 10491 in 2010. ...
to this category of threat that we had gained from the 2008 and 2010 Dagstuhl seminars on insider threats (Countering Insider Threats, #08302, and Insider Threats: Strategies for Prevention, Mitigation ...
in their network like interactions. ...
fatcat:lqejrqkk6fdhnnwiufoktwlf74
Biggest Failures in Security (Dagstuhl Seminar 19451)
2020
The idea of the Dagstuhl Seminar was to go one step back and to follow a comprehensive top-down approach instead. ...
To this end, the Dagstuhl Seminar was roughly divided into two parts. First, experienced experts from different disciplines gave overview talks on the main problems of their field. ...
Dagstuhl Seminar 16361:
Network Attack Detection and Defense: Security Challenges and Opportunities of Software-
Defined Networking, September 2016.
4
Marc Dacier, Hartmut König, Radoslaw Cwalinski, ...
doi:10.5445/ir/1000118000
fatcat:ixvkkkhsoravdlklbcxinvjvxm
Network Attack Detection and Defense Early Warning Systems-Challenges and Perspectives (Dagstuhl Seminar 12061) Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071) Information Visualization, Visual Data Mining and Machine Learning (Dagstuhl Seminar 12081) Principles of Provenance (Dagstuhl Seminar 12091)
2012
unpublished
Acknowledgements My thanks to various business groups within TCS and my lab head Mr. Arun Bahulkar for the intense discussions and feedback on the software system's problems. ...
URL http://dx.doi.org/10.1145/1791212.1791223 License
2 0 6 1
2 0 6 1
-Network Attack Detection and Defense EWS -Challenges and Perspectives
2 0 6 1
2 0 7 1
-Software Clone ...
It gave a good opportunity to inform about current challenges in the area of network attack detection and defense and discuss possible countermeasures. ...
fatcat:wwwsqzlhend7ne4x3a5grebnbi
Coalgebraic Logics (Dagstuhl Seminar 12411) Algebraic and Combinatorial Methods in Computational Complexity (Dagstuhl Seminar 12421) Time-of-Flight Imaging: Algorithms, Sensors and Applications (Dagstuhl Seminar 12431) Foundations and Challenges of Change and Evolution in Ontologies (Dagstuhl Seminar 12441) Requirements Management-Novel Perspectives and Challenges (Dagstuhl Seminar 12442)
2012
unpublished
We review the requirements problem as defined by Jackson and Zave [2]. We then discuss how computational complexity creeps in and how to cope with it. ...
The seminar thus built and expanded on some of the critical themes that had been brought up five years earlier in two NSF-sponsored workshops in Cleveland [5] and Dagstuhl [4] , [3] . ...
Detecting hidden storage side channel vulnerabilities in networked applications. ...
fatcat:3zuf3grgabettljj7apksbc4lq
50 Algebra in Computational Complexity (Dagstuhl Seminar 14391) Manindra Agrawal, Valentine Kabanets, Thomas Thierauf, and Christopher Umans 85 Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop
unpublished
this Dagstuhl seminar marking the 10th anniversary of the workshop. ...
We formalize security notions to capture this goal and then offer both attacks and defenses. ...
The proposed seminar also builds on the Dagstuhl Perspective Workshop 12212 Co-Design of Systems and Applications for Exascale, which also relates to the DFG-funded project FFMK (http://ffmk.tudos.org/ ...
fatcat:e5wnf6cuhvc3bceegijgut34zm
Analysis of Dynamic Social and Technological Networks (Dagstuhl Seminar 11452) Coding Theory (Dagstuhl Seminar 11461)
2011
Science and Engineering of Cyber-Physical Systems
unpublished
This motivates our interest in M@RT, and especially in continuous re-appraisal of requirements at run-time, which calls for effective and light-way methods for model representation and reasoning at run-time ...
., TOSEM'97, and a more recent one by Jureta et al., RE'08), as a dynamic problem (Qureshi at al., CAISE'11). ...
The participants of this seminar had a chance to interact with the Dagstuhl seminar 11542 "Analysis of Dynamic Social and Technological Networks" held at the same time. ...
fatcat:bwnjnbq2bjbolk52twaysozyxu
Connecting Performance Analysis and Visualization to Advance Extreme Scale Computing (Dagstuhl Seminar 14022) Randomized Timed and Hybrid Models for Critical Infrastructures (Dagstuhl Seminar 14031) Planning with Epistemic Goals (Dagstuhl Seminar 14032)
2014
unpublished
Note that the seed metaphor is a particularly interesting one in the context of DIY networking, and actually our Dagstuhl seminar was conceived more as a seed for future collaborations than a workshop ...
PMUs (phasor measurement units) and bad data detection algorithms (GPS spoofing attack). ...
Facebook's Tastes, ties and Time project and the release of data in 2008. ...
fatcat:iqk466everfcdhf5guvz5ph2ee
« Previous
Showing results 1 — 15 out of 51 results