The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IWIA"( http://dblp.L3S.de/Venues/IWIA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iwia

Publication years (Num. hits)
2003 (11) 2004 (13) 2005 (15) 2006 (15) 2010 (10)
Publication types (Num. hits)
inproceedings(59) proceedings(5)
Venues (Conferences, Journals, ...)
IWIA(64)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 49 occurrences of 46 keywords

Results
Found 64 publication records. Showing 64 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Antonio Artés, Filipa Duarte, Maryam Ashouei, Jos Huisken, José Luis Ayala, David Atienza, Francky Catthoor Energy Efficiency Using Loop Buffer based Instruction Memory Organizations. Search on Bibsonomy IWIA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Peter M. Kogge Exploring the Possible Past Futures of a Single Part Type Multi-core PIM Chip. Search on Bibsonomy IWIA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pedro Malagón, Juan-Mariano de Goyeneche, Marina Zapater, José Manuel Moya Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches. Search on Bibsonomy IWIA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marina Zapater, José L. Risco-Martín, Zorana Bankovic, José Luis Ayala, José Manuel Moya Combined Dynamic-Static Approach for Thermal-Awareness in Heterogeneous Data Centers. Search on Bibsonomy IWIA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Cisse Ahmadou Dit Adi, Ping Qiu, Hidetsugu Irie, Takefumi Miyoshi, Tsutomu Yoshinaga OREX - An Optical Ring with Electrical Crossbar Hybrid Photonic Network-on-Chip. Search on Bibsonomy IWIA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Peter M. Kogge, Patrick Anthony La Fratta, Megan Vance Facing the Exascale Energy Wall. Search on Bibsonomy IWIA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kazuhiro Yoshimura, Takashi Nakada, Yasuhiko Nakashima An Instruction Decomposition Method for Reconfigurable Decoders. Search on Bibsonomy IWIA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jun Yao 0001, Hajime Shimada, Kazutoshi Kobayashi A Stage-Level Recovery Scheme in Scalable Pipeline Modules for High Dependability. Search on Bibsonomy IWIA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Takuma Kogo, Nobuyuki Yamasaki VIX: A Router Architecture for Priority-Aware Networks-on-Chip. Search on Bibsonomy IWIA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kazuki Joe, Alexander V. Veidenbaum (eds.) International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010 Search on Bibsonomy IWIA The full citation details ... 2010 DBLP  BibTeX  RDF
1Suleyman Kondakci A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk Management. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Proactive IA, remote assessment, risk analysis and security management, Verification and validation of security, security protocol, security evaluation
1Simon P. Chung, Aloysius K. Mok The LAIDS/LIDS Framework for Systematic IPS Design. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine High Robustness Requirements in a Common Criteria Protection Profile. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF high robustness, common criteria, dynamic configuration, least privilege, separation kernel
1Allan Pedersen, Anders Hedegaard, Robin Sharp Designing a Secure Point-of-Sale System. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Bing Chen, Joohan Lee, Annie S. Wu Active Event Correlation in Bro IDS to Detect Multi-stage Attacks. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Emmanuel Hooper An Intelligent Detection and Response Strategy to False Positives and Network Attacks. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nils Aschenbruck, Matthias Frank 0001, Peter Martini, Jens Tölle, Roland Legat, Heinz-Dieter Richmann Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ole Martin Dahl, Stephen D. Wolthusen Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kevin Kahley, Manigandan Radhakrishnan, Jon A. Solworth Factoring High Level Information Flow Specifications into Low Level Access Controls. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hank Rausch Jamming Commercial Satellite Communications During Wartime: An Empirical Study. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF commercial satellite communications, hostile interference, jamming, denial of service attack
1E. Earl Eiland, Lorie M. Liebrock An Application of Information Theory to Intrusion Detection. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  BibTeX  RDF
1Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang HonIDS: Enhancing Honeypot System with Intrusion Detection Models. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Qingfeng He, Paul N. Otto, Annie I. Antón, Laurie A. Jones Ensuring Compliance between Policies, Requirements and Software Design: A Case Study. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zhen Liu, Susan M. Bridges, Rayford B. Vaughn Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  BibTeX  RDF
1William R. Speirs Making the Kernel Responsible: A New Approach to Detecting & Preventing Buffer Overflows. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sunu Mathew, Chintan Shah, Shambhu J. Upadhyaya An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jens Tölle, Marko Jahnke, Michael Bussmann, Sven Henkel Meta IDS Environments: An Event Message Anomaly Detection Approach. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Stephen Boyer, Oliver Dain, Robert K. Cunningham Stellar: A Fusion System for Scenario Construction and Security Risk Assessment. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chinyang Henry Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe A General Cooperative Intrusion Detection Architecture for MANETs. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joseph V. Antrosio, Errin W. Fulp Malware Defense Using Network Security Authentication. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mohamed Abdelhafez, George F. Riley Evaluation of Worm Containment Algorithms and Their Effect on Legitimate Traffic. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mohit Virendra, Shambhu J. Upadhyaya, Vivek Kumar, Vishal Anand 0001 SAWAN: A Survivable Architecture for Wireless LANs. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sriranjani Sitaraman, Subbarayan Venkatesan Forensic Analysis of File System Intrusions Using Improved Backtracking. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yves Younan, Wouter Joosen, Frank Piessens A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xiaoxin Yin, William Yurcik, Adam J. Slagell The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1John McDermott Attack-Potential-Based Survivability Modeling for High-Consequence Systems. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jaromir Likavec, Stephen D. Wolthusen Enforcing Messaging Security Policies. Search on Bibsonomy IWIA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Lawrence Teo, Yu-An Sun, Gail-Joon Ahn Defeating Internet Attacks Using Risk Awareness and Active Honeypots. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Japonica, Risk Awareness, Honeypots, Colored Petri Nets
1John L. Cole, Stephen D. Wolthusen (eds.) Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  BibTeX  RDF
1Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi Packet Filtering for Congestion Control under DoS Attacks. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ge Zhu, Akhilesh Tyagi Protection against Indirect Overflow Attacks on Pointers. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Paul A. Karger, Helmut Kurth Increased Information Flow Needs for High-Assurance Composite Evaluations. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF composite evaluation, smart cards, covert channels, common criteria, high assurance
1John Zachary, John C. McEachen, Daniel W. Ettlich Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Network assurance, real-time network monitoring, visualization, denial of service, network anomaly detection
1Giuseppe Ateniese, Chris Riley, Christian Scheideler Survivable Monitoring in Dynamic Networks. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF monitoring, network intrusion detection, emergency communication, audit logs, survivable storage
1Gustave Anderson, Leonardo F. Urbano, Gaurav Naik, David J. Dorsey, Andrew Mroczkowski, Donovan Artz, Nicholas Morizio, Andrew Burnheimer, Kris Malfettone, Daniel Lapadat, Evan Sultanik, Saturnino Garcia, Maxim Peysakhov, William C. Regli, Moshe Kam A Secure Wireless Agent-based Testbed. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jerald Dawkins, John Hale A Systematic Approach to Multi-Stage Network Attack Analysis. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Brian D. Carrier, Blake Matheny Methods for Cluster-Based Incident Detection. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Gautam Singaraju, Lawrence Teo, Yuliang Zheng 0001 A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF TIDeS, Environment Profile, Scalability, Fuzzy Logic, Intrusion Detection, Testbed, Evaluation Framework
1Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Dynamic Coalitions, Communities, Peer-to-Peer, Trust
1John G. Levine, Julian B. Grizzard, Henry L. Owen A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Cédric Llorens, Denis Valois, Yannick Le Teigner, Alexandre Gibouin Computational Complexity of the Network Routing Logical Security Assessment Process. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Network Policy, Routing, Computational Complexity, Graph Theory, Assessment
1Volker Hammer IT Design Critieria for Damage Reduction. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF damage potential, damage reduction, socio-technical criteria, requirements analysis, information assurance, IT Security, design criteria
1Vincent Berk, George Bakos, Robert Morris Designing a Framework for Active Worm Detection on Global Networks. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Fujita Tomonori, Ogawara Masanori Protecting the Integrity of an Entire File System. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Tim Gibson A Guard Architecture for Improved Coalition Operations. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1John L. Cole, Stephen D. Wolthusen (eds.) Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  BibTeX  RDF
1Nicholas Athanasiades, Randal T. Abler, John G. Levine, Henry L. Owen, George F. Riley Intrusion Detection Testing and Benchmarking Methodologies. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion Detection Testing, Network Attack Generation, Hacker Tools, Network Security
1Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1John R. James, Frank Mabry Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level Issue. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF enterprise processes, attack plan, model, architecture, component, information assurance
1Lawrence Teo, Yuliang Zheng 0001, Gail-Joon Ahn Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion Detection Force, Internet Scale, Fault Tolerance, Intrusion Detection, Information Sharing, Recovery, Survivability, Infrastructure
Displaying result #1 - #64 of 64 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license