default search action
3. IWIA 2005: College Park, Maryland, USA
- Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 23-24 March 2005, College Park, MD, USA. IEEE Computer Society 2005, ISBN 0-7695-2317-X
Malware Defense
- Yves Younan, Wouter Joosen, Frank Piessens:
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. 3-20 - William R. Speirs II:
Making the Kernel Responsible: A New Approach to Detecting & Preventing Buffer Overflows. 21-32 - Mohamed Abdelhafez, George F. Riley:
Evaluation of Worm Containment Algorithms and Their Effect on Legitimate Traffic. 33-42 - Joseph V. Antrosio, Errin W. Fulp:
Malware Defense Using Network Security Authentication. 43-54
MANET Security
- Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chinyang Henry Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe:
A General Cooperative Intrusion Detection Architecture for MANETs. 57-70 - Mohit Virendra, Shambhu J. Upadhyaya, Vivek Kumar, Vishal Anand:
SAWAN: A Survivable Architecture for Wireless LANs. 71-82
Intrusion Detection I
- Jens Tölle, Marko Jahnke, Michael Bussmann, Sven Henkel:
Meta IDS Environments: An Event Message Anomaly Detection Approach. 85-94 - Sunu Mathew, Chintan Shah, Shambhu J. Upadhyaya:
An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks. 95-104 - Stephen Boyer, Oliver Dain, Robert K. Cunningham:
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment. 105-116
Modeling and Policies
- John McDermott:
Attack-Potential-Based Survivability Modeling for High-Consequence Systems. 119-130 - Jaromir Likavec, Stephen D. Wolthusen:
Enforcing Messaging Security Policies. 131-138
Intrusion Detection II
- Xiaoxin Yin, William Yurcik, Adam J. Slagell:
The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. 141-153 - Sriranjani Sitaraman, Subbarayan Venkatesan:
Forensic Analysis of File System Intrusions Using Improved Backtracking. 154-163 - Zhen Liu, Susan M. Bridges, Rayford B. Vaughn:
Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models. 164-177
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.