Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Joshua W. Haines, Stephen A. Goulet, Robert S. Durst, Terrence G. Champion |
LLSIM: Network Simulation for Correlation and Response Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 243-250, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | M. Sedano Reynolds |
Next Generation DDoS web based Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 211-215, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Adam L. Young |
Non-Zero Sum Games and Survivable Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 24-29, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | David A. Yasenchock |
Army Reserve Information Operations Command Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 305, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | David A. Barlow, Vasos Vassiliou, Henry L. Owen |
A Cryptographic Protocol to Protect MPLS Labels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 237-242, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Jonas Hallberg, Amund Hunstad, Anna Stjerneby |
Identification of IT Security-Relevant System Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 143-150, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Fan Mingyu, Wang Jinahua, Wang Guangwe |
A Design of Hardware Cryptographic Co-Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 234-236, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Lance J. Hoffman, Timothy Rosenberg, Steve Willmore |
The Portable Educational Network (PEN). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 217-220, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Joe McCray |
A Road Map to Becoming Security Conscious. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 1-9, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Wei Yu 0002, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao 0001 |
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 84-91, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Fabio A. González 0001, Jonatan Gómez, Madhavi Kaniganti, Dipankar Dasgupta |
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 251-259, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Perry Wilson, Bruce Shank |
Costs and Benefits of Integrating Biometrics with a Navy Tactical Weapons System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 303-304, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Charles Reynolds |
An Undergraduate Information Assurance Curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 10-16, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Neil C. Rowe |
Counterplanning Deceptions To Foil Cyber-Attack Plans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 203-210, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning |
Detecting Insider Threats by Monitoring System Call Activity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 45-52, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Stephen D. Wolthusen |
A Distributed Multipurpose Mail Guard (Blinded). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 268-275, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Daniel Ragsdale, Scott D. Lathrop, Ronald Dodge |
A Virtual Environment for IA Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 17-23, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver |
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 92-99, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | John A. Hamilton Jr. |
Security Vulnerabilities in Command and Control Interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 164-169, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Donald J. Welch, Scott D. Lathrop |
Wirless Security Threat Taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 76-83, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Yong Chen, Christian Damsgaard Jensen, Jean-Marc Seigneur, Elizabeth Gray |
Risk Probability Estimating Based on Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 229-233, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Jun Li, Constantine N. Manikopoulos |
Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 53-59, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Peng Ning, Kun Sun 0001 |
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 60-67, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Mario Baldi, Yoram Ofek, Moti Yung |
The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 288-291, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Yanjun Zuo, Brajendra Panda |
Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 306-307, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Charles E. Phillips, Steven A. Demurjian, T. C. Ting |
Security Assurance for an RBAC/MAC Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 260-267, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Adam L. Young |
A Weakness in Smart Card PKI Certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 30-34, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Gustavo A. Santana Torrellas, Torella Sarturo, Arturo Torres Dominquez |
Bridge Certification Authorities: Connecting B2B Public Key Infrastructure with PAK and Zero-Knowledge Proof. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 182-187, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | John L. Cole |
IEEE Information Assuurance Activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 294-295, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Ingo McLean, Boleslaw K. Szymanski, Alan Bivens |
Methodology of Risk Assessment in Mobile Agent System Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 35-42, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | |
IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![IEEE, 0-7803-7808-3 The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | S. K. Dahel, Q. Xiao Dominquez |
Accuracy Performance Analysis of Multimodal Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 170-173, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Thomas P. Cahill, Konstantin Rozinov, Christopher Mulé |
Cyber Warfare Peacekeeping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 100-107, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Amit Valsangkar, Brajendra Panda |
An Architecture for Making Data Available Ceaselessly During Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 196-202, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Jukka Juslin, Teemupekka Virtanen |
Automatic Backdoor Analysis with Network Intrusion Detection System and Integrated Service Checker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 122-126, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Ningning Wu, Jing Zhang |
Factor Analysis Based Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 108-115, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Neil C. Rowe |
Counterplanning Deceptions to Foil Cyber Attack-Plans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 221-228, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Norka B. Lucena, Steve J. Chapin, Joohan Lee |
Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 135-143, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Clark Ray |
A Modest Proposal: Licencsing Personal Computers and Internet Service Providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 151-157, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 |
On Countermeasures to Traffic Analysis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 188-195, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Donald P. Julian, Neil C. Rowe, James Bret Michael |
Experiments with Deceptive Software Responses to Buffer-Based Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 43-44, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | James Butler, Jeffrey Undercoffer, John Pinkston |
Hidden Processes: The Implication for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 116-121, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Charles N. Payne Jr., Dorene Kewley Ryder |
On the Large-Scale Deployment of a Distributed Embedded Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 296-297, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Prabhat K. Singh, Arun Lakhotia |
Static Verification of Worm and virus Behavior in binary Executables using Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 298-300, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Martin Karresand |
Separating Trojan Horses from Viruses and Worms - A Proposed Taxonomy of Software Weapons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 127-134, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Cungang Yang, Chang N. Zhang |
Secure Web-based Applications with XML and RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 276-281, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen |
Wireless Intrusion Detection and Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 68-75, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya |
Insecure Programming: How Culpable is a Language's Syntax? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 158-163, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Javed A. Aslam, Sergey Bratus, David Kotz, Ronald A. Peterson, Daniela Rus, Brett Tofel |
The Kerf toolkit for intrusion analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 301-302, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Casimer M. DeCusatis |
Information Assurance for Enterprise Fiber Optic Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 282-287, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Manish Gupta 0004, Shamik Banerjee, H. Raghav Rao, Shambhu J. Upadhyaya |
Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 174-181, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Abdur Rahim Choudhary |
Security-Auditing in a Softswitch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 292-293, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|