Showing 61 - 70 of 7,217
Persistent link: https://www.econbiz.de/10011791235
In this paper we propose a decision model aimed at increasing security in a utility network (e.g., smart grid, water network). The network consists of edges that might be a viable target for terrorists depending on several factors such as geographical location, accessibility of the network, the...
Persistent link: https://www.econbiz.de/10010941825
The incentive regulation of costs related to physical and cyber security in electricity networks is an important but relatively unexplored and ambiguous issue. These costs can be part of a cost efficiency benchmarking or alternatively dealt separately. This paper discusses the issues and...
Persistent link: https://www.econbiz.de/10010949355
In a variety of settings, some payoff-relevant item spreads along a network of connected individuals. In some cases, the item will benefit those who receive it (for example, a music download, a stock tip, news about a new research funding source, etc.) while in other cases the impact may be...
Persistent link: https://www.econbiz.de/10009246894
In Network Security, there is a major issue to secure the public or private network from abnormal users. It is because each network is made up of users, services and computers with a specific behavior that is also called as heterogeneous system. To detect abnormal users, anomaly detection system...
Persistent link: https://www.econbiz.de/10009416499
We have witnessed in the recent years that open source tools have gained popularity among all types of users, from individuals or small businesses to large organizations and enterprises. In this paper we will present three open source IDS tools: OSSEC, Prelude and SNORT.
Persistent link: https://www.econbiz.de/10009416572
The wireless networks have changed the way organizations work and offered a new range of possibilities, but at the same time they introduced new security threats. While an attacker needs physical access to a wired network in order to launch an attack, a wireless network allows anyone within its...
Persistent link: https://www.econbiz.de/10009416645
Persistent link: https://www.econbiz.de/10012436627
Persistent link: https://www.econbiz.de/10014302482
The growing number of connected Internet of Things (IoT) devices has led to the daily growth of network botnet attacks. The networks of compromised devices controlled by a single entity can be used for malicious purposes such as denial of service distributed IoT botnet attacks and theft of...
Persistent link: https://www.econbiz.de/10014520396