default search action
SafeConfig 2011: Arlington, VA, USA
- John Banghart, Ehab Al-Shaer, Tony Sager, HariGovind V. Ramasamy:
4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011. IEEE 2011 - William M. Fitzgerald, Simon N. Foley:
Reasoning about the Security Configuration of SAN Switch Fabrics. - Simon N. Foley, William M. Fitzgerald, Wayne Mac Adams:
Federated Autonomic Network Access Control. - Michael B. Crouse, Errin W. Fulp:
A moving target environment for computer configurations using Genetic Algorithms. - Xin Sun, Jinliang Wei, Sanjay G. Rao, Geoffrey G. Xie:
A software toolkit for visualizing enterprise routing design. - Mohammad Ashiqur Rahman, Ehab Al-Shaer:
AMIAnalyzer: Security analysis of AMI configurations. - Yousra Javed, Maliha Nazir, Muhammad Murtaza Khan, Syed Ali Khayam, Shujun Li:
Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis. - Saeed Al-Haj, Ehab Al-Shaer:
CloudChecker: An imperative framework for cloud configuration management. - Ehab Al-Shaer, Mohammed Noraden Alsaleh:
ConfigChecker: A tool for comprehensive security configuration analytics. - Fida Gillani, Umar Kalim, Noman Latif, Syed Ali Khayam:
Decision Theoretic Approach to Detect Anomalies beyond Enterprise Boundaries. - Saeed Al-Haj, Ehab Al-Shaer:
Measuring Firewall Security. - Ludi Akue, Emmanuel Lavinal, Michelle Sibilla:
A Dynamic Configuration Validation Language. - Hicham El Khoury, Romain Laborde, François Barrère, Abdelmalek Benzekri, Maroun Chamoun:
A Generic Data Flow Security Model. - Mohammed Noraden Alsaleh, Ehab Al-Shaer:
SCAP Based Configuration Analytics for Comprehensive Compliance Checking. - Krishna Kant, Meixing Le, Sushil Jajodia:
Security Considerations in Data Center Configuration Management. - Eugen Leontie, Gedare Bloom, Rahul Simha:
Automation for Creating and Configuring Security Manifests for Hardware Containers. - Said Marouf, Mohamed Shehab:
SEGrapher: Visualization-based SELinux Policy Analysis. - Sanjai Narain, Sharad Malik, Ehab Al-Shaer:
Towards Eliminating Configuration Errors in Cyber Infrastructure. - Rick Kuhn:
Vulnerability Hierarchies in Access Control Configurations.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.