Search dblp for Publications

export results for "stream:conf/iwia:"

 download as .bib file

@inproceedings{DBLP:conf/iwia/AschenbruckFMTLR06,
  author       = {Nils Aschenbruck and
                  Matthias Frank and
                  Peter Martini and
                  Jens T{\"{o}}lle and
                  Roland Legat and
                  Heinz{-}Dieter Richmann},
  title        = {Present and Future Challenges Concerning DoS-attacks against PSAPs
                  in VoIP Networks},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {103--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.19},
  doi          = {10.1109/IWIA.2006.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/AschenbruckFMTLR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/BolzoniEHZ06,
  author       = {Damiano Bolzoni and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Emmanuele Zambon},
  title        = {{POSEIDON:} a 2-tier Anomaly-based Network Intrusion Detection System},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {144--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.18},
  doi          = {10.1109/IWIA.2006.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/BolzoniEHZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/ChenLW06,
  author       = {Bing Chen and
                  Joohan Lee and
                  Annie S. Wu},
  title        = {Active Event Correlation in Bro {IDS} to Detect Multi-stage Attacks},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {32--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.2},
  doi          = {10.1109/IWIA.2006.2},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/ChenLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/ChungM06,
  author       = {Simon P. Chung and
                  Aloysius K. Mok},
  title        = {The {LAIDS/LIDS} Framework for Systematic {IPS} Design},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {3--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.21},
  doi          = {10.1109/IWIA.2006.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/ChungM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/DahlW06,
  author       = {Ole Martin Dahl and
                  Stephen D. Wolthusen},
  title        = {Modeling and Execution of Complex Attack Scenarios using Interval
                  Timed Colored Petri Nets},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {157--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.17},
  doi          = {10.1109/IWIA.2006.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/DahlW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/EilandL06,
  author       = {E. Earl Eiland and
                  Lorie M. Liebrock},
  title        = {An Application of Information Theory to Intrusion Detection},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {119--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.3},
  doi          = {10.1109/IWIA.2006.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/EilandL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/HeOAJ06,
  author       = {Qingfeng He and
                  Paul N. Otto and
                  Annie I. Ant{\'{o}}n and
                  Laurie A. Jones},
  title        = {Ensuring Compliance between Policies, Requirements and Software Design:
                  {A} Case Study},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {79--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.7},
  doi          = {10.1109/IWIA.2006.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/HeOAJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/Hooper06,
  author       = {Emmanuel Hooper},
  title        = {An Intelligent Detection and Response Strategy to False Positives
                  and Network Attacks},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {12--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.4},
  doi          = {10.1109/IWIA.2006.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/Hooper06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/KahleyRS06,
  author       = {Kevin Kahley and
                  Manigandan Radhakrishnan and
                  Jon A. Solworth},
  title        = {Factoring High Level Information Flow Specifications into Low Level
                  Access Controls},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {169--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.8},
  doi          = {10.1109/IWIA.2006.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/KahleyRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/Kondakci06,
  author       = {Suleyman Kondakci},
  title        = {A Remote {IT} Security Evaluation Scheme: {A} Proactive Approach to
                  Risk Management},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {93--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.1},
  doi          = {10.1109/IWIA.2006.1},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/Kondakci06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/NguyenLI06,
  author       = {Thuy D. Nguyen and
                  Timothy E. Levin and
                  Cynthia E. Irvine},
  title        = {High Robustness Requirements in a Common Criteria Protection Profile},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {66--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.13},
  doi          = {10.1109/IWIA.2006.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/NguyenLI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/PedersenHS06,
  author       = {Allan Pedersen and
                  Anders Hedegaard and
                  Robin Sharp},
  title        = {Designing a Secure Point-of-Sale System},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {51--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.6},
  doi          = {10.1109/IWIA.2006.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/PedersenHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/Rausch06,
  author       = {Hank Rausch},
  title        = {Jamming Commercial Satellite Communications During Wartime: An Empirical
                  Study},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {109--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.15},
  doi          = {10.1109/IWIA.2006.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/Rausch06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/TangHLW06,
  author       = {Yong Tang and
                  Hua{-}Ping Hu and
                  Xicheng Lu and
                  Jie Wang},
  title        = {HonIDS: Enhancing Honeypot System with Intrusion Detection Models},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {135--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.14},
  doi          = {10.1109/IWIA.2006.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/TangHLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwia/2006,
  title        = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/10708/proceeding},
  isbn         = {0-7695-2564-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwia/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/AbdelhafezR05,
  author       = {Mohamed Abdelhafez and
                  George F. Riley},
  title        = {Evaluation of Worm Containment Algorithms and Their Effect on Legitimate
                  Traffic},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {33--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.8},
  doi          = {10.1109/IWIA.2005.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/AbdelhafezR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/AntrosioF05,
  author       = {Joseph V. Antrosio and
                  Errin W. Fulp},
  title        = {Malware Defense Using Network Security Authentication},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {43--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.11},
  doi          = {10.1109/IWIA.2005.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/AntrosioF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/BoyerDC05,
  author       = {Stephen Boyer and
                  Oliver Dain and
                  Robert K. Cunningham},
  title        = {Stellar: {A} Fusion System for Scenario Construction and Security
                  Risk Assessment},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {105--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.16},
  doi          = {10.1109/IWIA.2005.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/BoyerDC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/LikavecW05,
  author       = {Jaromir Likavec and
                  Stephen D. Wolthusen},
  title        = {Enforcing Messaging Security Policies},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {131--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.7},
  doi          = {10.1109/IWIA.2005.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/LikavecW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/LiuBV05,
  author       = {Zhen Liu and
                  Susan M. Bridges and
                  Rayford B. Vaughn},
  title        = {Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion
                  Detection Models},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {164--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.6},
  doi          = {10.1109/IWIA.2005.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/LiuBV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/MathewSU05,
  author       = {Sunu Mathew and
                  Chintan Shah and
                  Shambhu J. Upadhyaya},
  title        = {An Alert Fusion Framework for Situation Awareness of Coordinated Multistage
                  Attacks},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {95--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.3},
  doi          = {10.1109/IWIA.2005.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/MathewSU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/McDermott05,
  author       = {John McDermott},
  title        = {Attack-Potential-Based Survivability Modeling for High-Consequence
                  Systems},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {119--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.4},
  doi          = {10.1109/IWIA.2005.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/McDermott05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/SitaramanV05,
  author       = {Sriranjani Sitaraman and
                  Subbarayan Venkatesan},
  title        = {Forensic Analysis of File System Intrusions Using Improved Backtracking},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {154--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.9},
  doi          = {10.1109/IWIA.2005.9},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/SitaramanV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/Speirs05,
  author       = {William R. Speirs II},
  title        = {Making the Kernel Responsible: {A} New Approach to Detecting {\&}
                  Preventing Buffer Overflows},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {21--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.10},
  doi          = {10.1109/IWIA.2005.10},
  timestamp    = {Fri, 21 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwia/Speirs05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/SterneBCWTKBTBLR05,
  author       = {Daniel F. Sterne and
                  Poornima Balasubramanyam and
                  David Carman and
                  Brett Wilson and
                  Rajesh Talpade and
                  Calvin Ko and
                  Ravindra Balupari and
                  Chinyang Henry Tseng and
                  Thomas F. Bowen and
                  Karl N. Levitt and
                  Jeff Rowe},
  title        = {A General Cooperative Intrusion Detection Architecture for MANETs},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {57--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.1},
  doi          = {10.1109/IWIA.2005.1},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwia/SterneBCWTKBTBLR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/TolleJBH05,
  author       = {Jens T{\"{o}}lle and
                  Marko Jahnke and
                  Michael Bussmann and
                  Sven Henkel},
  title        = {Meta {IDS} Environments: An Event Message Anomaly Detection Approach},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {85--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.13},
  doi          = {10.1109/IWIA.2005.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/TolleJBH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/VirendraUKA05,
  author       = {Mohit Virendra and
                  Shambhu J. Upadhyaya and
                  Vivek Kumar and
                  Vishal Anand},
  title        = {{SAWAN:} {A} Survivable Architecture for Wireless LANs},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {71--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.15},
  doi          = {10.1109/IWIA.2005.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/VirendraUKA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/YinYS05,
  author       = {Xiaoxin Yin and
                  William Yurcik and
                  Adam J. Slagell},
  title        = {The Design of VisFlowConnect-IP: {A} Link Analysis System for {IP}
                  Security Situational Awareness},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {141--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.17},
  doi          = {10.1109/IWIA.2005.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/YinYS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/YounanJP05,
  author       = {Yves Younan and
                  Wouter Joosen and
                  Frank Piessens},
  title        = {A Methodology for Designing Countermeasures against Current and Future
                  Code Injection Attacks},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {3--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.2},
  doi          = {10.1109/IWIA.2005.2},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/YounanJP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwia/2005,
  title        = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9686/proceeding},
  isbn         = {0-7695-2317-X},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwia/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/AndersonUNDMAMBMLSGPRK04,
  author       = {Gustave Anderson and
                  Leonardo F. Urbano and
                  Gaurav Naik and
                  David J. Dorsey and
                  Andrew Mroczkowski and
                  Donovan Artz and
                  Nicholas Morizio and
                  Andrew Burnheimer and
                  Kris Malfettone and
                  Daniel Lapadat and
                  Evan Sultanik and
                  Saturnino Garcia and
                  Maxim Peysakhov and
                  William C. Regli and
                  Moshe Kam},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {A Secure Wireless Agent-based Testbed},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {19--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288035},
  doi          = {10.1109/IWIA.2004.1288035},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/AndersonUNDMAMBMLSGPRK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/AtenieseRS04,
  author       = {Giuseppe Ateniese and
                  Chris Riley and
                  Christian Scheideler},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Survivable Monitoring in Dynamic Networks},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {33--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288036},
  doi          = {10.1109/IWIA.2004.1288036},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/AtenieseRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/CarrierM04,
  author       = {Brian D. Carrier and
                  Blake Matheny},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Methods for Cluster-Based Incident Detection},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {71--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288039},
  doi          = {10.1109/IWIA.2004.1288039},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/CarrierM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/DawkinsH04,
  author       = {Jerald Dawkins and
                  John Hale},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {A Systematic Approach to Multi-Stage Network Attack Analysis},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {48--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288037},
  doi          = {10.1109/IWIA.2004.1288037},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwia/DawkinsH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/HuCC04,
  author       = {Yen{-}Hung Hu and
                  Hongsik Choi and
                  Hyeong{-}Ah Choi},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Packet Filtering for Congestion Control under DoS Attacks},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {3--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288034},
  doi          = {10.1109/IWIA.2004.1288034},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/HuCC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/KargerK04,
  author       = {Paul A. Karger and
                  Helmut Kurth},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Increased Information Flow Needs for High-Assurance Composite Evaluations},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {129--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288043},
  doi          = {10.1109/IWIA.2004.1288043},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/KargerK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/KhambattiDR04,
  author       = {Mujtaba Khambatti and
                  Partha Dasgupta and
                  Kyung Dong Ryu},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic
                  Coalitions},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {141--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288044},
  doi          = {10.1109/IWIA.2004.1288044},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/KhambattiDR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/LevineGO04,
  author       = {John G. Levine and
                  Julian B. Grizzard and
                  Henry L. Owen},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {A Methodology to Detect and Characterize Kernel Level Rootkit Exploits
                  Involving Redirection of the System Call Table},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {107--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288042},
  doi          = {10.1109/IWIA.2004.1288042},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/LevineGO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/SingarajuTZ04,
  author       = {Gautam Singaraju and
                  Lawrence Teo and
                  Yuliang Zheng},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {A Testbed for Quantitative Assessment of Intrusion Detection Systems
                  using Fuzzy Logic},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {79--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288040},
  doi          = {10.1109/IWIA.2004.1288040},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/SingarajuTZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/TeoSA04,
  author       = {Lawrence Teo and
                  Yu{-}An Sun and
                  Gail{-}Joon Ahn},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Defeating Internet Attacks Using Risk Awareness and Active Honeypots},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {155--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288045},
  doi          = {10.1109/IWIA.2004.1288045},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/TeoSA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/ZacharyME04,
  author       = {John Zachary and
                  John C. McEachen and
                  Daniel W. Ettlich},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Conversation Exchange Dynamics for Real-Time Network Monitoring and
                  Anomaly Detection},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {59--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288038},
  doi          = {10.1109/IWIA.2004.1288038},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/ZacharyME04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/ZhuT04,
  author       = {Ge Zhu and
                  Akhilesh Tyagi},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Protection against Indirect Overflow Attacks on Pointers},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {97--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288041},
  doi          = {10.1109/IWIA.2004.1288041},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/ZhuT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwia/2004,
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9053/proceeding},
  isbn         = {0-7695-2117-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwia/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/AthanasiadesALOR03,
  author       = {Nicholas Athanasiades and
                  Randal T. Abler and
                  John G. Levine and
                  Henry L. Owen and
                  George F. Riley},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Intrusion Detection Testing and Benchmarking Methodologies},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {63--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192459},
  doi          = {10.1109/IWIAS.2003.1192459},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/AthanasiadesALOR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/BerkBM03,
  author       = {Vincent Berk and
                  George Bakos and
                  Robert Morris},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Designing a Framework for Active Worm Detection on Global Networks},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {13--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192455},
  doi          = {10.1109/IWIAS.2003.1192455},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/BerkBM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/ChinchaniUK03,
  author       = {Ramkumar Chinchani and
                  Shambhu J. Upadhyaya and
                  Kevin A. Kwiat},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {A Tamper-Resistant Framework for Unambiguous Detection of Attacks
                  in User Space Using Process Monitors},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {25--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192456},
  doi          = {10.1109/IWIAS.2003.1192456},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/ChinchaniUK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/Estevez-TapiadorGD03,
  author       = {Juan M. Est{\'{e}}vez{-}Tapiador and
                  Pedro Garcia{-}Teodoro and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {3--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192454},
  doi          = {10.1109/IWIAS.2003.1192454},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/Estevez-TapiadorGD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/Gibson03,
  author       = {Tim Gibson},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {A Guard Architecture for Improved Coalition Operations},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {89--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192461},
  doi          = {10.1109/IWIAS.2003.1192461},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/Gibson03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/Hammer03,
  author       = {Volker Hammer},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {{IT} Design Critieria for Damage Reduction},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {49--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192458},
  doi          = {10.1109/IWIAS.2003.1192458},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/Hammer03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/JamesM03,
  author       = {John R. James and
                  Frank Mabry},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level
                  Issue},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {109--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192463},
  doi          = {10.1109/IWIAS.2003.1192463},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/JamesM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/LlorensVTG03,
  author       = {C{\'{e}}dric Llorens and
                  Denis Valois and
                  Yannick Le Teigner and
                  Alexandre Gibouin},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Computational Complexity of the Network Routing Logical Security Assessment
                  Process},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {37--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192457},
  doi          = {10.1109/IWIAS.2003.1192457},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/LlorensVTG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/TeoZA03,
  author       = {Lawrence Teo and
                  Yuliang Zheng and
                  Gail{-}Joon Ahn},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion
                  Detection},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {73--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192460},
  doi          = {10.1109/IWIAS.2003.1192460},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/TeoZA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/TomonoriM03,
  author       = {Fujita Tomonori and
                  Ogawara Masanori},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Protecting the Integrity of an Entire File System},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {95--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192462},
  doi          = {10.1109/IWIAS.2003.1192462},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/TomonoriM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwia/2003,
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8484/proceeding},
  isbn         = {0-7695-2019-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwia/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}