default search action
2. IWIA 2004: Charlotte, North Carolina, USA
- John L. Cole, Stephen D. Wolthusen:
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA. IEEE Computer Society 2004, ISBN 0-7695-2117-7
Network Security Metrics and Tools
- Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi:
Packet Filtering for Congestion Control under DoS Attacks. 3-18 - Gustave Anderson, Leonardo F. Urbano, Gaurav Naik, David J. Dorsey, Andrew Mroczkowski, Donovan Artz, Nicholas Morizio, Andrew Burnheimer, Kris Malfettone, Daniel Lapadat, Evan Sultanik, Saturnino Garcia, Maxim Peysakhov, William C. Regli, Moshe Kam:
A Secure Wireless Agent-based Testbed. 19-32 - Giuseppe Ateniese, Chris Riley, Christian Scheideler:
Survivable Monitoring in Dynamic Networks. 33-47 - Jerald Dawkins, John Hale:
A Systematic Approach to Multi-Stage Network Attack Analysis. 48-58
Intrusion Detection
- John Zachary, John C. McEachen, Daniel W. Ettlich:
Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. 59-70 - Brian D. Carrier, Blake Matheny:
Methods for Cluster-Based Incident Detection. 71-78 - Gautam Singaraju, Lawrence Teo, Yuliang Zheng:
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. 79-96
Host Security
- Ge Zhu, Akhilesh Tyagi:
Protection against Indirect Overflow Attacks on Pointers. 97-106 - John G. Levine, Julian B. Grizzard, Henry L. Owen:
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. 107-128
Modeling and Evaluation
- Paul A. Karger, Helmut Kurth:
Increased Information Flow Needs for High-Assurance Composite Evaluations. 129-140 - Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu:
A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. 141-154 - Lawrence Teo, Yu-An Sun, Gail-Joon Ahn:
Defeating Internet Attacks Using Risk Awareness and Active Honeypots. 155-168
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.