The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IAW"( http://dblp.L3S.de/Venues/IAW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iaw

Publication years (Num. hits)
2003 (52)
Publication types (Num. hits)
inproceedings(51) proceedings(1)
Venues (Conferences, Journals, ...)
IAW(52)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 52 publication records. Showing 52 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Joshua W. Haines, Stephen A. Goulet, Robert S. Durst, Terrence G. Champion LLSIM: Network Simulation for Correlation and Response Testing. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1M. Sedano Reynolds Next Generation DDoS web based Attacks. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Adam L. Young Non-Zero Sum Games and Survivable Malware. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1David A. Yasenchock Army Reserve Information Operations Command Overview. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1David A. Barlow, Vasos Vassiliou, Henry L. Owen A Cryptographic Protocol to Protect MPLS Labels. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Jonas Hallberg, Amund Hunstad, Anna Stjerneby Identification of IT Security-Relevant System Characteristics. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Fan Mingyu, Wang Jinahua, Wang Guangwe A Design of Hardware Cryptographic Co-Processor. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Lance J. Hoffman, Timothy Rosenberg, Steve Willmore The Portable Educational Network (PEN). Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Joe McCray A Road Map to Becoming Security Conscious. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Wei Yu 0002, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao 0001 Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Fabio A. González 0001, Jonatan Gómez, Madhavi Kaniganti, Dipankar Dasgupta An Evolutionary Approach to Generate Fuzzy Anomaly Signatures. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Perry Wilson, Bruce Shank Costs and Benefits of Integrating Biometrics with a Navy Tactical Weapons System. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Charles Reynolds An Undergraduate Information Assurance Curriculum. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Neil C. Rowe Counterplanning Deceptions To Foil Cyber-Attack Plans. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning Detecting Insider Threats by Monitoring System Call Activity. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Stephen D. Wolthusen A Distributed Multipurpose Mail Guard (Blinded). Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Daniel Ragsdale, Scott D. Lathrop, Ronald Dodge A Virtual Environment for IA Education. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1John A. Hamilton Jr. Security Vulnerabilities in Command and Control Interoperability. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Donald J. Welch, Scott D. Lathrop Wirless Security Threat Taxonomy. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Yong Chen, Christian Damsgaard Jensen, Jean-Marc Seigneur, Elizabeth Gray Risk Probability Estimating Based on Clustering. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Jun Li, Constantine N. Manikopoulos Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Peng Ning, Kun Sun 0001 How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Mario Baldi, Yoram Ofek, Moti Yung The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Yanjun Zuo, Brajendra Panda Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Charles E. Phillips, Steven A. Demurjian, T. C. Ting Security Assurance for an RBAC/MAC Security Model. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Adam L. Young A Weakness in Smart Card PKI Certification. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Gustavo A. Santana Torrellas, Torella Sarturo, Arturo Torres Dominquez Bridge Certification Authorities: Connecting B2B Public Key Infrastructure with PAK and Zero-Knowledge Proof. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1John L. Cole IEEE Information Assuurance Activities. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Ingo McLean, Boleslaw K. Szymanski, Alan Bivens Methodology of Risk Assessment in Mobile Agent System Design. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1 IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1S. K. Dahel, Q. Xiao Dominquez Accuracy Performance Analysis of Multimodal Biometrics. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Thomas P. Cahill, Konstantin Rozinov, Christopher Mulé Cyber Warfare Peacekeeping. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Amit Valsangkar, Brajendra Panda An Architecture for Making Data Available Ceaselessly During Recovery. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Jukka Juslin, Teemupekka Virtanen Automatic Backdoor Analysis with Network Intrusion Detection System and Integrated Service Checker. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Ningning Wu, Jing Zhang Factor Analysis Based Anomaly Detection. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Neil C. Rowe Counterplanning Deceptions to Foil Cyber Attack-Plans. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Norka B. Lucena, Steve J. Chapin, Joohan Lee Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Clark Ray A Modest Proposal: Licencsing Personal Computers and Internet Service Providers. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 On Countermeasures to Traffic Analysis Attacks. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Donald P. Julian, Neil C. Rowe, James Bret Michael Experiments with Deceptive Software Responses to Buffer-Based Attacks. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1James Butler, Jeffrey Undercoffer, John Pinkston Hidden Processes: The Implication for Intrusion Detection. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Charles N. Payne Jr., Dorene Kewley Ryder On the Large-Scale Deployment of a Distributed Embedded Firewall. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Prabhat K. Singh, Arun Lakhotia Static Verification of Worm and virus Behavior in binary Executables using Model Checking. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Martin Karresand Separating Trojan Horses from Viruses and Worms - A Proposed Taxonomy of Software Weapons. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Cungang Yang, Chang N. Zhang Secure Web-based Applications with XML and RBAC. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen Wireless Intrusion Detection and Response. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya Insecure Programming: How Culpable is a Language's Syntax? Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Javed A. Aslam, Sergey Bratus, David Kotz, Ronald A. Peterson, Daniela Rus, Brett Tofel The Kerf toolkit for intrusion analysis. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Casimer M. DeCusatis Information Assurance for Enterprise Fiber Optic Networks. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Manish Gupta 0004, Shamik Banerjee, H. Raghav Rao, Shambhu J. Upadhyaya Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
1Abdur Rahim Choudhary Security-Auditing in a Softswitch. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
Displaying result #1 - #52 of 52 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license