Why Wassenaar Arrangement's Definitions of "Intrusion Software" and "Controlled Items" Put Security Research and Defense At Risk.
Sergey BratusMichael E. LocastoAnna ShubinaPublished in: login Usenix Mag. (2014)
Keyphrases
- intrusion detection
- network security
- risk assessment
- intrusion detection system
- security vulnerabilities
- information security
- security risks
- anomaly detection
- computer networks
- risk analysis
- computer security
- security issues
- security policies
- dos attacks
- intrusion detection and prevention
- high risk
- computer systems
- software development
- cyber defense
- software tools
- data mining
- source code
- iso iec
- denial of service attacks
- risk management
- cyber security
- software systems
- access control
- information systems
- network traffic
- software architecture
- alert correlation
- user interface