Gail-Joon Ahn, UNC Charlotte motivation malicious bots surgein attacks 1241 bots collected by them in the past year 25% not detected by AV tools background…
Tag: iciw2008
Daniel J. Cotton, Univ of Nebraska, Omaha Vista Firewall filter incoming & outgoing traffic IPSec Address space layout randomization (ASLR) Moves vista around in memory…
Are the System Security Watchmen Asleep? Dr. Roger Schell, Aesec Corporation, Palo Alto, CA Executives are frequently clueless about security rely on professionals to be…
Stuart Kurkowski, Air Force Institute of Technology, Wright-Patterson AFB Work in progress, developing the tool to do all this Fused Alert Data alert data is…
Carl Colwill, BT DEsign Security Risk & Compliance, UK “The insider will always be the greatest threat” Worry about the senior people, not just the…
Conference is tightly scheduled. All presentations are 20 Min + 5 min for Q&A then 5 min to move to next session. Ooh! There’s going…
Today I’m attending day one of a two-day conference titled he 3rd International Conference on I-Warfare and Security on the University of Nebraska, Omaha campus.…