|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 49 occurrences of 46 keywords
|
|
|
Results
Found 64 publication records. Showing 64 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Antonio Artés, Filipa Duarte, Maryam Ashouei, Jos Huisken, José Luis Ayala, David Atienza, Francky Catthoor |
Energy Efficiency Using Loop Buffer based Instruction Memory Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010, pp. 59-67, 2010, IEEE, 978-0-7695-4396-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Peter M. Kogge |
Exploring the Possible Past Futures of a Single Part Type Multi-core PIM Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010, pp. 30-38, 2010, IEEE, 978-0-7695-4396-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Malagón, Juan-Mariano de Goyeneche, Marina Zapater, José Manuel Moya |
Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010, pp. 68-74, 2010, IEEE, 978-0-7695-4396-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marina Zapater, José L. Risco-Martín, Zorana Bankovic, José Luis Ayala, José Manuel Moya |
Combined Dynamic-Static Approach for Thermal-Awareness in Heterogeneous Data Centers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010, pp. 75-82, 2010, IEEE, 978-0-7695-4396-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cisse Ahmadou Dit Adi, Ping Qiu, Hidetsugu Irie, Takefumi Miyoshi, Tsutomu Yoshinaga |
OREX - An Optical Ring with Electrical Crossbar Hybrid Photonic Network-on-Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010, pp. 3-10, 2010, IEEE, 978-0-7695-4396-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Peter M. Kogge, Patrick Anthony La Fratta, Megan Vance |
Facing the Exascale Energy Wall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010, pp. 51-58, 2010, IEEE, 978-0-7695-4396-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazuhiro Yoshimura, Takashi Nakada, Yasuhiko Nakashima |
An Instruction Decomposition Method for Reconfigurable Decoders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010, pp. 39-47, 2010, IEEE, 978-0-7695-4396-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jun Yao 0001, Hajime Shimada, Kazutoshi Kobayashi |
A Stage-Level Recovery Scheme in Scalable Pipeline Modules for High Dependability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010, pp. 21-29, 2010, IEEE, 978-0-7695-4396-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Takuma Kogo, Nobuyuki Yamasaki |
VIX: A Router Architecture for Priority-Aware Networks-on-Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010, pp. 11-18, 2010, IEEE, 978-0-7695-4396-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Joe, Alexander V. Veidenbaum (eds.) |
International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, IWIA 2010, Hilo, Kohala Coast, HI, USA, January 17-19, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![IEEE, 978-0-7695-4396-3 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Suleyman Kondakci |
A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 93-102, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Proactive IA, remote assessment, risk analysis and security management, Verification and validation of security, security protocol, security evaluation |
1 | Simon P. Chung, Aloysius K. Mok |
The LAIDS/LIDS Framework for Systematic IPS Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 3-11, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine |
High Robustness Requirements in a Common Criteria Protection Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 66-78, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
high robustness, common criteria, dynamic configuration, least privilege, separation kernel |
1 | Allan Pedersen, Anders Hedegaard, Robin Sharp |
Designing a Secure Point-of-Sale System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 51-65, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Bing Chen, Joohan Lee, Annie S. Wu |
Active Event Correlation in Bro IDS to Detect Multi-stage Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 32-50, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon |
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 144-156, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Hooper |
An Intelligent Detection and Response Strategy to False Positives and Network Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 12-31, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Nils Aschenbruck, Matthias Frank 0001, Peter Martini, Jens Tölle, Roland Legat, Heinz-Dieter Richmann |
Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 103-108, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ole Martin Dahl, Stephen D. Wolthusen |
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 157-168, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Kahley, Manigandan Radhakrishnan, Jon A. Solworth |
Factoring High Level Information Flow Specifications into Low Level Access Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 169-186, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hank Rausch |
Jamming Commercial Satellite Communications During Wartime: An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 109-118, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
commercial satellite communications, hostile interference, jamming, denial of service attack |
1 | E. Earl Eiland, Lorie M. Liebrock |
An Application of Information Theory to Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 119-134, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![IEEE Computer Society, 0-7695-2564-4 The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang |
HonIDS: Enhancing Honeypot System with Intrusion Detection Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 135-143, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Qingfeng He, Paul N. Otto, Annie I. Antón, Laurie A. Jones |
Ensuring Compliance between Policies, Requirements and Software Design: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 79-92, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Liu, Susan M. Bridges, Rayford B. Vaughn |
Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 164-177, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![IEEE Computer Society, 0-7695-2317-X The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | William R. Speirs |
Making the Kernel Responsible: A New Approach to Detecting & Preventing Buffer Overflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 21-32, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sunu Mathew, Chintan Shah, Shambhu J. Upadhyaya |
An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 95-104, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jens Tölle, Marko Jahnke, Michael Bussmann, Sven Henkel |
Meta IDS Environments: An Event Message Anomaly Detection Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 85-94, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Boyer, Oliver Dain, Robert K. Cunningham |
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 105-116, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chinyang Henry Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe |
A General Cooperative Intrusion Detection Architecture for MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 57-70, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Joseph V. Antrosio, Errin W. Fulp |
Malware Defense Using Network Security Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 43-54, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Abdelhafez, George F. Riley |
Evaluation of Worm Containment Algorithms and Their Effect on Legitimate Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 33-42, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mohit Virendra, Shambhu J. Upadhyaya, Vivek Kumar, Vishal Anand 0001 |
SAWAN: A Survivable Architecture for Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 71-82, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sriranjani Sitaraman, Subbarayan Venkatesan |
Forensic Analysis of File System Intrusions Using Improved Backtracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 154-163, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yves Younan, Wouter Joosen, Frank Piessens |
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 3-20, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoxin Yin, William Yurcik, Adam J. Slagell |
The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 141-153, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | John McDermott |
Attack-Potential-Based Survivability Modeling for High-Consequence Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 119-130, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jaromir Likavec, Stephen D. Wolthusen |
Enforcing Messaging Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA, pp. 131-138, 2005, IEEE Computer Society, 0-7695-2317-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Lawrence Teo, Yu-An Sun, Gail-Joon Ahn |
Defeating Internet Attacks Using Risk Awareness and Active Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 155-168, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Japonica, Risk Awareness, Honeypots, Colored Petri Nets |
1 | John L. Cole, Stephen D. Wolthusen (eds.) |
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![IEEE Computer Society, 0-7695-2117-7 The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi |
Packet Filtering for Congestion Control under DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 3-18, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ge Zhu, Akhilesh Tyagi |
Protection against Indirect Overflow Attacks on Pointers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 97-106, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Paul A. Karger, Helmut Kurth |
Increased Information Flow Needs for High-Assurance Composite Evaluations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 129-140, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
composite evaluation, smart cards, covert channels, common criteria, high assurance |
1 | John Zachary, John C. McEachen, Daniel W. Ettlich |
Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 59-70, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Network assurance, real-time network monitoring, visualization, denial of service, network anomaly detection |
1 | Giuseppe Ateniese, Chris Riley, Christian Scheideler |
Survivable Monitoring in Dynamic Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 33-47, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
monitoring, network intrusion detection, emergency communication, audit logs, survivable storage |
1 | Gustave Anderson, Leonardo F. Urbano, Gaurav Naik, David J. Dorsey, Andrew Mroczkowski, Donovan Artz, Nicholas Morizio, Andrew Burnheimer, Kris Malfettone, Daniel Lapadat, Evan Sultanik, Saturnino Garcia, Maxim Peysakhov, William C. Regli, Moshe Kam |
A Secure Wireless Agent-based Testbed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 19-32, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jerald Dawkins, John Hale |
A Systematic Approach to Multi-Stage Network Attack Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 48-58, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Brian D. Carrier, Blake Matheny |
Methods for Cluster-Based Incident Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 71-78, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Gautam Singaraju, Lawrence Teo, Yuliang Zheng 0001 |
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 79-96, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
TIDeS, Environment Profile, Scalability, Fuzzy Logic, Intrusion Detection, Testbed, Evaluation Framework |
1 | Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu |
A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 141-154, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Dynamic Coalitions, Communities, Peer-to-Peer, Trust |
1 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 107-128, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Cédric Llorens, Denis Valois, Yannick Le Teigner, Alexandre Gibouin |
Computational Complexity of the Network Routing Logical Security Assessment Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 37-48, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Network Policy, Routing, Computational Complexity, Graph Theory, Assessment |
1 | Volker Hammer |
IT Design Critieria for Damage Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 49-62, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
damage potential, damage reduction, socio-technical criteria, requirements analysis, information assurance, IT Security, design criteria |
1 | Vincent Berk, George Bakos, Robert Morris |
Designing a Framework for Active Worm Detection on Global Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 13-24, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat |
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 25-36, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Fujita Tomonori, Ogawara Masanori |
Protecting the Integrity of an Entire File System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 95-108, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Tim Gibson |
A Guard Architecture for Improved Coalition Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 89-94, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | John L. Cole, Stephen D. Wolthusen (eds.) |
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![IEEE Computer Society, 0-7695-2019-7 The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Nicholas Athanasiades, Randal T. Abler, John G. Levine, Henry L. Owen, George F. Riley |
Intrusion Detection Testing and Benchmarking Methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 63-72, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Intrusion Detection Testing, Network Attack Generation, Hacker Tools, Network Security |
1 | Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo |
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 3-12, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | John R. James, Frank Mabry |
Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level Issue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 109-112, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
enterprise processes, attack plan, model, architecture, component, information assurance |
1 | Lawrence Teo, Yuliang Zheng 0001, Gail-Joon Ahn |
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 73-88, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Intrusion Detection Force, Internet Scale, Fault Tolerance, Intrusion Detection, Information Sharing, Recovery, Survivability, Infrastructure |
Displaying result #1 - #64 of 64 (100 per page; Change: )
|
|