default search action
Search dblp for Publications
export results for "stream:conf/iwia:"
@inproceedings{DBLP:conf/iwia/AschenbruckFMTLR06, author = {Nils Aschenbruck and Matthias Frank and Peter Martini and Jens T{\"{o}}lle and Roland Legat and Heinz{-}Dieter Richmann}, title = {Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {103--108}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.19}, doi = {10.1109/IWIA.2006.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/AschenbruckFMTLR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/BolzoniEHZ06, author = {Damiano Bolzoni and Sandro Etalle and Pieter H. Hartel and Emmanuele Zambon}, title = {{POSEIDON:} a 2-tier Anomaly-based Network Intrusion Detection System}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {144--156}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.18}, doi = {10.1109/IWIA.2006.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/BolzoniEHZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/ChenLW06, author = {Bing Chen and Joohan Lee and Annie S. Wu}, title = {Active Event Correlation in Bro {IDS} to Detect Multi-stage Attacks}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {32--50}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.2}, doi = {10.1109/IWIA.2006.2}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/ChenLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/ChungM06, author = {Simon P. Chung and Aloysius K. Mok}, title = {The {LAIDS/LIDS} Framework for Systematic {IPS} Design}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {3--11}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.21}, doi = {10.1109/IWIA.2006.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/ChungM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/DahlW06, author = {Ole Martin Dahl and Stephen D. Wolthusen}, title = {Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {157--168}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.17}, doi = {10.1109/IWIA.2006.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/DahlW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/EilandL06, author = {E. Earl Eiland and Lorie M. Liebrock}, title = {An Application of Information Theory to Intrusion Detection}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {119--134}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.3}, doi = {10.1109/IWIA.2006.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/EilandL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/HeOAJ06, author = {Qingfeng He and Paul N. Otto and Annie I. Ant{\'{o}}n and Laurie A. Jones}, title = {Ensuring Compliance between Policies, Requirements and Software Design: {A} Case Study}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {79--92}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.7}, doi = {10.1109/IWIA.2006.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/HeOAJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/Hooper06, author = {Emmanuel Hooper}, title = {An Intelligent Detection and Response Strategy to False Positives and Network Attacks}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {12--31}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.4}, doi = {10.1109/IWIA.2006.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/Hooper06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/KahleyRS06, author = {Kevin Kahley and Manigandan Radhakrishnan and Jon A. Solworth}, title = {Factoring High Level Information Flow Specifications into Low Level Access Controls}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {169--186}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.8}, doi = {10.1109/IWIA.2006.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/KahleyRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/Kondakci06, author = {Suleyman Kondakci}, title = {A Remote {IT} Security Evaluation Scheme: {A} Proactive Approach to Risk Management}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {93--102}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.1}, doi = {10.1109/IWIA.2006.1}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/Kondakci06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/NguyenLI06, author = {Thuy D. Nguyen and Timothy E. Levin and Cynthia E. Irvine}, title = {High Robustness Requirements in a Common Criteria Protection Profile}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {66--78}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.13}, doi = {10.1109/IWIA.2006.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/NguyenLI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/PedersenHS06, author = {Allan Pedersen and Anders Hedegaard and Robin Sharp}, title = {Designing a Secure Point-of-Sale System}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {51--65}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.6}, doi = {10.1109/IWIA.2006.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/PedersenHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/Rausch06, author = {Hank Rausch}, title = {Jamming Commercial Satellite Communications During Wartime: An Empirical Study}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {109--118}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.15}, doi = {10.1109/IWIA.2006.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/Rausch06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/TangHLW06, author = {Yong Tang and Hua{-}Ping Hu and Xicheng Lu and Jie Wang}, title = {HonIDS: Enhancing Honeypot System with Intrusion Detection Models}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {135--143}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.14}, doi = {10.1109/IWIA.2006.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/TangHLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwia/2006, title = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://ieeexplore.ieee.org/xpl/conhome/10708/proceeding}, isbn = {0-7695-2564-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwia/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/AbdelhafezR05, author = {Mohamed Abdelhafez and George F. Riley}, title = {Evaluation of Worm Containment Algorithms and Their Effect on Legitimate Traffic}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {33--42}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.8}, doi = {10.1109/IWIA.2005.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/AbdelhafezR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/AntrosioF05, author = {Joseph V. Antrosio and Errin W. Fulp}, title = {Malware Defense Using Network Security Authentication}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {43--54}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.11}, doi = {10.1109/IWIA.2005.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/AntrosioF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/BoyerDC05, author = {Stephen Boyer and Oliver Dain and Robert K. Cunningham}, title = {Stellar: {A} Fusion System for Scenario Construction and Security Risk Assessment}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {105--116}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.16}, doi = {10.1109/IWIA.2005.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/BoyerDC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/LikavecW05, author = {Jaromir Likavec and Stephen D. Wolthusen}, title = {Enforcing Messaging Security Policies}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {131--138}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.7}, doi = {10.1109/IWIA.2005.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/LikavecW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/LiuBV05, author = {Zhen Liu and Susan M. Bridges and Rayford B. Vaughn}, title = {Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {164--177}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.6}, doi = {10.1109/IWIA.2005.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/LiuBV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/MathewSU05, author = {Sunu Mathew and Chintan Shah and Shambhu J. Upadhyaya}, title = {An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {95--104}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.3}, doi = {10.1109/IWIA.2005.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/MathewSU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/McDermott05, author = {John McDermott}, title = {Attack-Potential-Based Survivability Modeling for High-Consequence Systems}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {119--130}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.4}, doi = {10.1109/IWIA.2005.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/McDermott05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/SitaramanV05, author = {Sriranjani Sitaraman and Subbarayan Venkatesan}, title = {Forensic Analysis of File System Intrusions Using Improved Backtracking}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {154--163}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.9}, doi = {10.1109/IWIA.2005.9}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/SitaramanV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/Speirs05, author = {William R. Speirs II}, title = {Making the Kernel Responsible: {A} New Approach to Detecting {\&} Preventing Buffer Overflows}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {21--32}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.10}, doi = {10.1109/IWIA.2005.10}, timestamp = {Fri, 21 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwia/Speirs05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/SterneBCWTKBTBLR05, author = {Daniel F. Sterne and Poornima Balasubramanyam and David Carman and Brett Wilson and Rajesh Talpade and Calvin Ko and Ravindra Balupari and Chinyang Henry Tseng and Thomas F. Bowen and Karl N. Levitt and Jeff Rowe}, title = {A General Cooperative Intrusion Detection Architecture for MANETs}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {57--70}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.1}, doi = {10.1109/IWIA.2005.1}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwia/SterneBCWTKBTBLR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/TolleJBH05, author = {Jens T{\"{o}}lle and Marko Jahnke and Michael Bussmann and Sven Henkel}, title = {Meta {IDS} Environments: An Event Message Anomaly Detection Approach}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {85--94}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.13}, doi = {10.1109/IWIA.2005.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/TolleJBH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/VirendraUKA05, author = {Mohit Virendra and Shambhu J. Upadhyaya and Vivek Kumar and Vishal Anand}, title = {{SAWAN:} {A} Survivable Architecture for Wireless LANs}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {71--82}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.15}, doi = {10.1109/IWIA.2005.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/VirendraUKA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/YinYS05, author = {Xiaoxin Yin and William Yurcik and Adam J. Slagell}, title = {The Design of VisFlowConnect-IP: {A} Link Analysis System for {IP} Security Situational Awareness}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {141--153}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.17}, doi = {10.1109/IWIA.2005.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/YinYS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/YounanJP05, author = {Yves Younan and Wouter Joosen and Frank Piessens}, title = {A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {3--20}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.2}, doi = {10.1109/IWIA.2005.2}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/YounanJP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwia/2005, title = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/9686/proceeding}, isbn = {0-7695-2317-X}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwia/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/AndersonUNDMAMBMLSGPRK04, author = {Gustave Anderson and Leonardo F. Urbano and Gaurav Naik and David J. Dorsey and Andrew Mroczkowski and Donovan Artz and Nicholas Morizio and Andrew Burnheimer and Kris Malfettone and Daniel Lapadat and Evan Sultanik and Saturnino Garcia and Maxim Peysakhov and William C. Regli and Moshe Kam}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {A Secure Wireless Agent-based Testbed}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {19--32}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288035}, doi = {10.1109/IWIA.2004.1288035}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/AndersonUNDMAMBMLSGPRK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/AtenieseRS04, author = {Giuseppe Ateniese and Chris Riley and Christian Scheideler}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Survivable Monitoring in Dynamic Networks}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {33--47}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288036}, doi = {10.1109/IWIA.2004.1288036}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/AtenieseRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/CarrierM04, author = {Brian D. Carrier and Blake Matheny}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Methods for Cluster-Based Incident Detection}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {71--78}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288039}, doi = {10.1109/IWIA.2004.1288039}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/CarrierM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/DawkinsH04, author = {Jerald Dawkins and John Hale}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {A Systematic Approach to Multi-Stage Network Attack Analysis}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {48--58}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288037}, doi = {10.1109/IWIA.2004.1288037}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwia/DawkinsH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/HuCC04, author = {Yen{-}Hung Hu and Hongsik Choi and Hyeong{-}Ah Choi}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Packet Filtering for Congestion Control under DoS Attacks}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {3--18}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288034}, doi = {10.1109/IWIA.2004.1288034}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/HuCC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/KargerK04, author = {Paul A. Karger and Helmut Kurth}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Increased Information Flow Needs for High-Assurance Composite Evaluations}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {129--140}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288043}, doi = {10.1109/IWIA.2004.1288043}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/KargerK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/KhambattiDR04, author = {Mujtaba Khambatti and Partha Dasgupta and Kyung Dong Ryu}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {141--154}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288044}, doi = {10.1109/IWIA.2004.1288044}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/KhambattiDR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/LevineGO04, author = {John G. Levine and Julian B. Grizzard and Henry L. Owen}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {107--128}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288042}, doi = {10.1109/IWIA.2004.1288042}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/LevineGO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/SingarajuTZ04, author = {Gautam Singaraju and Lawrence Teo and Yuliang Zheng}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {79--96}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288040}, doi = {10.1109/IWIA.2004.1288040}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/SingarajuTZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/TeoSA04, author = {Lawrence Teo and Yu{-}An Sun and Gail{-}Joon Ahn}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Defeating Internet Attacks Using Risk Awareness and Active Honeypots}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {155--168}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288045}, doi = {10.1109/IWIA.2004.1288045}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/TeoSA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/ZacharyME04, author = {John Zachary and John C. McEachen and Daniel W. Ettlich}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {59--70}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288038}, doi = {10.1109/IWIA.2004.1288038}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/ZacharyME04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/ZhuT04, author = {Ge Zhu and Akhilesh Tyagi}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Protection against Indirect Overflow Attacks on Pointers}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {97--106}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288041}, doi = {10.1109/IWIA.2004.1288041}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/ZhuT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwia/2004, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://ieeexplore.ieee.org/xpl/conhome/9053/proceeding}, isbn = {0-7695-2117-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwia/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/AthanasiadesALOR03, author = {Nicholas Athanasiades and Randal T. Abler and John G. Levine and Henry L. Owen and George F. Riley}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Intrusion Detection Testing and Benchmarking Methodologies}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {63--72}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192459}, doi = {10.1109/IWIAS.2003.1192459}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/AthanasiadesALOR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/BerkBM03, author = {Vincent Berk and George Bakos and Robert Morris}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Designing a Framework for Active Worm Detection on Global Networks}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {13--24}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192455}, doi = {10.1109/IWIAS.2003.1192455}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/BerkBM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/ChinchaniUK03, author = {Ramkumar Chinchani and Shambhu J. Upadhyaya and Kevin A. Kwiat}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {25--36}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192456}, doi = {10.1109/IWIAS.2003.1192456}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/ChinchaniUK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/Estevez-TapiadorGD03, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Pedro Garcia{-}Teodoro and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {3--12}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192454}, doi = {10.1109/IWIAS.2003.1192454}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/Estevez-TapiadorGD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/Gibson03, author = {Tim Gibson}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {A Guard Architecture for Improved Coalition Operations}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {89--94}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192461}, doi = {10.1109/IWIAS.2003.1192461}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/Gibson03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/Hammer03, author = {Volker Hammer}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {{IT} Design Critieria for Damage Reduction}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {49--62}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192458}, doi = {10.1109/IWIAS.2003.1192458}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/Hammer03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/JamesM03, author = {John R. James and Frank Mabry}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level Issue}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {109--112}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192463}, doi = {10.1109/IWIAS.2003.1192463}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/JamesM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/LlorensVTG03, author = {C{\'{e}}dric Llorens and Denis Valois and Yannick Le Teigner and Alexandre Gibouin}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Computational Complexity of the Network Routing Logical Security Assessment Process}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {37--48}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192457}, doi = {10.1109/IWIAS.2003.1192457}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/LlorensVTG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/TeoZA03, author = {Lawrence Teo and Yuliang Zheng and Gail{-}Joon Ahn}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {73--88}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192460}, doi = {10.1109/IWIAS.2003.1192460}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/TeoZA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/TomonoriM03, author = {Fujita Tomonori and Ogawara Masanori}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Protecting the Integrity of an Entire File System}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {95--108}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192462}, doi = {10.1109/IWIAS.2003.1192462}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/TomonoriM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwia/2003, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://ieeexplore.ieee.org/xpl/conhome/8484/proceeding}, isbn = {0-7695-2019-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwia/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.