|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 49 occurrences of 46 keywords
|
|
|
Results
Found 64 publication records. Showing 64 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Antonio Artés, Filipa Duarte, Maryam Ashouei, Jos Huisken, José Luis Ayala, David Atienza, Francky Catthoor |
Energy Efficiency Using Loop Buffer based Instruction Memory Organizations. |
IWIA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Peter M. Kogge |
Exploring the Possible Past Futures of a Single Part Type Multi-core PIM Chip. |
IWIA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Malagón, Juan-Mariano de Goyeneche, Marina Zapater, José Manuel Moya |
Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches. |
IWIA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marina Zapater, José L. Risco-Martín, Zorana Bankovic, José Luis Ayala, José Manuel Moya |
Combined Dynamic-Static Approach for Thermal-Awareness in Heterogeneous Data Centers. |
IWIA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cisse Ahmadou Dit Adi, Ping Qiu, Hidetsugu Irie, Takefumi Miyoshi, Tsutomu Yoshinaga |
OREX - An Optical Ring with Electrical Crossbar Hybrid Photonic Network-on-Chip. |
IWIA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Peter M. Kogge, Patrick Anthony La Fratta, Megan Vance |
Facing the Exascale Energy Wall. |
IWIA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazuhiro Yoshimura, Takashi Nakada, Yasuhiko Nakashima |
An Instruction Decomposition Method for Reconfigurable Decoders. |
IWIA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jun Yao 0001, Hajime Shimada, Kazutoshi Kobayashi |
A Stage-Level Recovery Scheme in Scalable Pipeline Modules for High Dependability. |
IWIA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Takuma Kogo, Nobuyuki Yamasaki |
VIX: A Router Architecture for Priority-Aware Networks-on-Chip. |
IWIA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Joe, Alexander V. Veidenbaum (eds.) |
International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010 |
IWIA |
2010 |
DBLP BibTeX RDF |
|
1 | Suleyman Kondakci |
A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk Management. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
Proactive IA, remote assessment, risk analysis and security management, Verification and validation of security, security protocol, security evaluation |
1 | Simon P. Chung, Aloysius K. Mok |
The LAIDS/LIDS Framework for Systematic IPS Design. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine |
High Robustness Requirements in a Common Criteria Protection Profile. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
high robustness, common criteria, dynamic configuration, least privilege, separation kernel |
1 | Allan Pedersen, Anders Hedegaard, Robin Sharp |
Designing a Secure Point-of-Sale System. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Bing Chen, Joohan Lee, Annie S. Wu |
Active Event Correlation in Bro IDS to Detect Multi-stage Attacks. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon |
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Hooper |
An Intelligent Detection and Response Strategy to False Positives and Network Attacks. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Nils Aschenbruck, Matthias Frank 0001, Peter Martini, Jens Tölle, Roland Legat, Heinz-Dieter Richmann |
Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ole Martin Dahl, Stephen D. Wolthusen |
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Kahley, Manigandan Radhakrishnan, Jon A. Solworth |
Factoring High Level Information Flow Specifications into Low Level Access Controls. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hank Rausch |
Jamming Commercial Satellite Communications During Wartime: An Empirical Study. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
commercial satellite communications, hostile interference, jamming, denial of service attack |
1 | E. Earl Eiland, Lorie M. Liebrock |
An Application of Information Theory to Intrusion Detection. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK |
IWIA |
2006 |
DBLP BibTeX RDF |
|
1 | Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang |
HonIDS: Enhancing Honeypot System with Intrusion Detection Models. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Qingfeng He, Paul N. Otto, Annie I. Antón, Laurie A. Jones |
Ensuring Compliance between Policies, Requirements and Software Design: A Case Study. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Liu, Susan M. Bridges, Rayford B. Vaughn |
Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA |
IWIA |
2005 |
DBLP BibTeX RDF |
|
1 | William R. Speirs |
Making the Kernel Responsible: A New Approach to Detecting & Preventing Buffer Overflows. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sunu Mathew, Chintan Shah, Shambhu J. Upadhyaya |
An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jens Tölle, Marko Jahnke, Michael Bussmann, Sven Henkel |
Meta IDS Environments: An Event Message Anomaly Detection Approach. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Boyer, Oliver Dain, Robert K. Cunningham |
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chinyang Henry Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe |
A General Cooperative Intrusion Detection Architecture for MANETs. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Joseph V. Antrosio, Errin W. Fulp |
Malware Defense Using Network Security Authentication. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Abdelhafez, George F. Riley |
Evaluation of Worm Containment Algorithms and Their Effect on Legitimate Traffic. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mohit Virendra, Shambhu J. Upadhyaya, Vivek Kumar, Vishal Anand 0001 |
SAWAN: A Survivable Architecture for Wireless LANs. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sriranjani Sitaraman, Subbarayan Venkatesan |
Forensic Analysis of File System Intrusions Using Improved Backtracking. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yves Younan, Wouter Joosen, Frank Piessens |
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoxin Yin, William Yurcik, Adam J. Slagell |
The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | John McDermott |
Attack-Potential-Based Survivability Modeling for High-Consequence Systems. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jaromir Likavec, Stephen D. Wolthusen |
Enforcing Messaging Security Policies. |
IWIA |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Lawrence Teo, Yu-An Sun, Gail-Joon Ahn |
Defeating Internet Attacks Using Risk Awareness and Active Honeypots. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
Japonica, Risk Awareness, Honeypots, Colored Petri Nets |
1 | John L. Cole, Stephen D. Wolthusen (eds.) |
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA |
IWIA |
2004 |
DBLP BibTeX RDF |
|
1 | Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi |
Packet Filtering for Congestion Control under DoS Attacks. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ge Zhu, Akhilesh Tyagi |
Protection against Indirect Overflow Attacks on Pointers. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Paul A. Karger, Helmut Kurth |
Increased Information Flow Needs for High-Assurance Composite Evaluations. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
composite evaluation, smart cards, covert channels, common criteria, high assurance |
1 | John Zachary, John C. McEachen, Daniel W. Ettlich |
Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
Network assurance, real-time network monitoring, visualization, denial of service, network anomaly detection |
1 | Giuseppe Ateniese, Chris Riley, Christian Scheideler |
Survivable Monitoring in Dynamic Networks. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
monitoring, network intrusion detection, emergency communication, audit logs, survivable storage |
1 | Gustave Anderson, Leonardo F. Urbano, Gaurav Naik, David J. Dorsey, Andrew Mroczkowski, Donovan Artz, Nicholas Morizio, Andrew Burnheimer, Kris Malfettone, Daniel Lapadat, Evan Sultanik, Saturnino Garcia, Maxim Peysakhov, William C. Regli, Moshe Kam |
A Secure Wireless Agent-based Testbed. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jerald Dawkins, John Hale |
A Systematic Approach to Multi-Stage Network Attack Analysis. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Brian D. Carrier, Blake Matheny |
Methods for Cluster-Based Incident Detection. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Gautam Singaraju, Lawrence Teo, Yuliang Zheng 0001 |
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
TIDeS, Environment Profile, Scalability, Fuzzy Logic, Intrusion Detection, Testbed, Evaluation Framework |
1 | Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu |
A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
Dynamic Coalitions, Communities, Peer-to-Peer, Trust |
1 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Cédric Llorens, Denis Valois, Yannick Le Teigner, Alexandre Gibouin |
Computational Complexity of the Network Routing Logical Security Assessment Process. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
Network Policy, Routing, Computational Complexity, Graph Theory, Assessment |
1 | Volker Hammer |
IT Design Critieria for Damage Reduction. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
damage potential, damage reduction, socio-technical criteria, requirements analysis, information assurance, IT Security, design criteria |
1 | Vincent Berk, George Bakos, Robert Morris |
Designing a Framework for Active Worm Detection on Global Networks. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat |
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Fujita Tomonori, Ogawara Masanori |
Protecting the Integrity of an Entire File System. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Tim Gibson |
A Guard Architecture for Improved Coalition Operations. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
|
1 | John L. Cole, Stephen D. Wolthusen (eds.) |
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany |
IWIA |
2003 |
DBLP BibTeX RDF |
|
1 | Nicholas Athanasiades, Randal T. Abler, John G. Levine, Henry L. Owen, George F. Riley |
Intrusion Detection Testing and Benchmarking Methodologies. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
Intrusion Detection Testing, Network Attack Generation, Hacker Tools, Network Security |
1 | Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo |
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
|
1 | John R. James, Frank Mabry |
Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level Issue. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
enterprise processes, attack plan, model, architecture, component, information assurance |
1 | Lawrence Teo, Yuliang Zheng 0001, Gail-Joon Ahn |
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
Intrusion Detection Force, Internet Scale, Fault Tolerance, Intrusion Detection, Information Sharing, Recovery, Survivability, Infrastructure |
Displaying result #1 - #64 of 64 (100 per page; Change: )
|
|