Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Joshua W. Haines, Stephen A. Goulet, Robert S. Durst, Terrence G. Champion |
LLSIM: Network Simulation for Correlation and Response Testing. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | M. Sedano Reynolds |
Next Generation DDoS web based Attacks. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Adam L. Young |
Non-Zero Sum Games and Survivable Malware. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | David A. Yasenchock |
Army Reserve Information Operations Command Overview. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | David A. Barlow, Vasos Vassiliou, Henry L. Owen |
A Cryptographic Protocol to Protect MPLS Labels. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Jonas Hallberg, Amund Hunstad, Anna Stjerneby |
Identification of IT Security-Relevant System Characteristics. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Fan Mingyu, Wang Jinahua, Wang Guangwe |
A Design of Hardware Cryptographic Co-Processor. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Lance J. Hoffman, Timothy Rosenberg, Steve Willmore |
The Portable Educational Network (PEN). |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Joe McCray |
A Road Map to Becoming Security Conscious. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Wei Yu 0002, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao 0001 |
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Fabio A. González 0001, Jonatan Gómez, Madhavi Kaniganti, Dipankar Dasgupta |
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Perry Wilson, Bruce Shank |
Costs and Benefits of Integrating Biometrics with a Navy Tactical Weapons System. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Charles Reynolds |
An Undergraduate Information Assurance Curriculum. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Neil C. Rowe |
Counterplanning Deceptions To Foil Cyber-Attack Plans. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning |
Detecting Insider Threats by Monitoring System Call Activity. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Stephen D. Wolthusen |
A Distributed Multipurpose Mail Guard (Blinded). |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Daniel Ragsdale, Scott D. Lathrop, Ronald Dodge |
A Virtual Environment for IA Education. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver |
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | John A. Hamilton Jr. |
Security Vulnerabilities in Command and Control Interoperability. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Donald J. Welch, Scott D. Lathrop |
Wirless Security Threat Taxonomy. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Yong Chen, Christian Damsgaard Jensen, Jean-Marc Seigneur, Elizabeth Gray |
Risk Probability Estimating Based on Clustering. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Jun Li, Constantine N. Manikopoulos |
Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Peng Ning, Kun Sun 0001 |
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Mario Baldi, Yoram Ofek, Moti Yung |
The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Yanjun Zuo, Brajendra Panda |
Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Charles E. Phillips, Steven A. Demurjian, T. C. Ting |
Security Assurance for an RBAC/MAC Security Model. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Adam L. Young |
A Weakness in Smart Card PKI Certification. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Gustavo A. Santana Torrellas, Torella Sarturo, Arturo Torres Dominquez |
Bridge Certification Authorities: Connecting B2B Public Key Infrastructure with PAK and Zero-Knowledge Proof. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | John L. Cole |
IEEE Information Assuurance Activities. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Ingo McLean, Boleslaw K. Szymanski, Alan Bivens |
Methodology of Risk Assessment in Mobile Agent System Design. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | |
IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | S. K. Dahel, Q. Xiao Dominquez |
Accuracy Performance Analysis of Multimodal Biometrics. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Thomas P. Cahill, Konstantin Rozinov, Christopher Mulé |
Cyber Warfare Peacekeeping. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Amit Valsangkar, Brajendra Panda |
An Architecture for Making Data Available Ceaselessly During Recovery. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Jukka Juslin, Teemupekka Virtanen |
Automatic Backdoor Analysis with Network Intrusion Detection System and Integrated Service Checker. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Ningning Wu, Jing Zhang |
Factor Analysis Based Anomaly Detection. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Neil C. Rowe |
Counterplanning Deceptions to Foil Cyber Attack-Plans. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Norka B. Lucena, Steve J. Chapin, Joohan Lee |
Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Clark Ray |
A Modest Proposal: Licencsing Personal Computers and Internet Service Providers. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 |
On Countermeasures to Traffic Analysis Attacks. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Donald P. Julian, Neil C. Rowe, James Bret Michael |
Experiments with Deceptive Software Responses to Buffer-Based Attacks. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | James Butler, Jeffrey Undercoffer, John Pinkston |
Hidden Processes: The Implication for Intrusion Detection. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Charles N. Payne Jr., Dorene Kewley Ryder |
On the Large-Scale Deployment of a Distributed Embedded Firewall. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Prabhat K. Singh, Arun Lakhotia |
Static Verification of Worm and virus Behavior in binary Executables using Model Checking. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Martin Karresand |
Separating Trojan Horses from Viruses and Worms - A Proposed Taxonomy of Software Weapons. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Cungang Yang, Chang N. Zhang |
Secure Web-based Applications with XML and RBAC. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen |
Wireless Intrusion Detection and Response. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya |
Insecure Programming: How Culpable is a Language's Syntax? |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Javed A. Aslam, Sergey Bratus, David Kotz, Ronald A. Peterson, Daniela Rus, Brett Tofel |
The Kerf toolkit for intrusion analysis. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Casimer M. DeCusatis |
Information Assurance for Enterprise Fiber Optic Networks. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Manish Gupta 0004, Shamik Banerjee, H. Raghav Rao, Shambhu J. Upadhyaya |
Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security. |
IAW |
2003 |
DBLP BibTeX RDF |
|
1 | Abdur Rahim Choudhary |
Security-Auditing in a Softswitch. |
IAW |
2003 |
DBLP BibTeX RDF |
|