The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The modern cyber crime activities largely rely on malware-based infrastructure, i.e. botnets and backdoors in popular services for collecting private financial data, distributed denial of service and etc. A significant effort to develop better methods and tools for accurate malware detection and prevention is mounted both by the industry and academic community. With this paper we present current research...
This paper contains a summary of a significant amount of findings carried out collectively by a global research community specifically aimed at determining mutually beneficial and hot topics for international collaboration on the research and development of Trustworthy ICT. The paper highlights a sampling of these topics that were deemed to produce the most impact and it provides an introduction to...
This document gives an overview over current research within the security group at Friedrich-Alexander-University Erlangen-Nuremberg, Germany, and attempts to describe the future research roadmap of the group. This roadmap is structured around the landscape of cyber crime with its three main groups of actors (attackers, users and investigators) and their main activities and deficits: attack and evasion...
This paper summarizes the past, present and future lines of research in the systems security area pursued by the Performance Evaluation Lab (VPLab) of Politecnico di Milano. We describe our past research in the area of learning algorithms applied to intrusion detection, our current work in the area of malware analysis, and our future research outlook, oriented to the cloud, to mobile device security,...
This paper introduces the current research and future plans of the Free Secure Network Systems Group at the Technische Universitaet Muenchen. In particular, we provide some insight into the development process and architecture of the GNU net P2P framework and the challenges we are currently working on.
Guaranteeing the safety of computers connected to the Internet is a challenging task. Despite the efforts of contemporary security software, the threat remains due to the incapability of existing software to predict and prevent the variance of attacks. According to recent studies, new computer malware appears at an almost constant rate, making their confrontation a rather difficult task and therefore...
The paper presents information on past, present and future research activities in IICT-BAS in the field of ICT security. The main directions of these activities are: critical infrastructure cyberattacks protection, security of distributed systems, security of social networks and dependability of distributed systems.
The paper presents the current and future research in the area of network and computer security at NASK, focusing on activities of CERT Polska and NISM teams. A large part of the activities are driven by the operational needs of CERT Polska, but independent research themes are also pursued. Most of the work concentrates either on threat detection methods (server and client honey pots) and threat intelligence...
Micro kernel-based systems have gone through a steady development and current implementations have reached a new level of functionality. While the first systems started with the fundamental idea, latest systems offer a wide range of features. Experience showed that the most important feature, a secure system architecture, cannot be retrofitted into the system at a later stage but must be the core...
CIDre, which stands for ``Confidentialy, Integrity, Availability, and repartition'', is the name of a new research group created in Rennes, France, as a follow-up of the SSIR team (www.rennes.supelec.fr/ren/rd/ssir), which was, until 2011, a Supélec team whose work was mainly focused on intrusion detection and spontaneous network (ad hoc, P2P) security. The global research objective of this new CIDre...
The Laboratory of Cryptography and System Security (CrySyS) is dedicated to conduct research in the field of computer security and user privacy. This paper shows a research roadmap of the CrySyS Lab from its inception in 2003 until today. We will present the major achievements in the past with a particular emphasis on the research and teaching curriculum in security and privacy. We will discuss network-...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.