Prude
Prude The main objective of this project was to define a framework and associated tools for the development of object-oriented software systems in a rigorous and precise way. Problem The recent evolution of application areas such as the Internet and mobile...
Spider
Spider Our objective in this work has been to develop a proactive intrusion detection and recovery system. In order to achieve pro-activity, we focused on improving detection effectiveness in terms of performance and accuracy. We believe that early detection is the...
Security testing & engineering using metrics
Security testing & engineering using metrics The security testing & engineering using metrics project allows the user to evaluate the design of his system based on security metrics. Learn more on the security testing & engineering using metrics project...
Whitenoise
Whitenoise was a new stream cipher invented and developed by BSB Utilities Inc. The ISOT Lab conducted the evaluation of the Whitenoise cryptosystem. The evaluation was carried out based on the validation metrics and tools designed by the National Institute of...
Rule based decision tree (RBDT)
Most of the methods that generate decision trees for a specific problem use examples of data instances in the decision tree generation process. We propose a new method called "RBDT-1" (rule based decision tree) for learning a decision tree from a set of decision rules...
Behavioral biometrics
The protection of computing systems and their users is a critical objective in this Internet era. A common protection mechanism consists of using a password to access your personal computer. Passwords, however, are notoriously insecure. There are several tools on the...
Botnet detection
The objective of our research is to develop a botnet detection and identification framework using traffic identification techniques. A botnet is a collection of computers connected to the Internet which have been compromised and are being controlled remotely by an...
Owner-retained control system
Beyond the common security threats that characterize networked systems, collaborative working environments have several additional security requirements of their own that are fundamental. In such untrusted environments user requirements in terms of security and...
Performance analyzer
Performance Analyzer is a neat little tool designed to analyze any distributed system based on various models, laws and metrics. Learn more on the performance analyzer site.
Intrusion characterization analysis toolkit
Network and computer forensics analysis is an after the fact process that investigates malicious activities conducted over computer networks to gather useful intelligence. Forensics investigation results are used to design security techniques and strategies to prevent...