Search dblp for Publications

export results for "toc:db/conf/iwia/iwia2005.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iwia/AbdelhafezR05,
  author       = {Mohamed Abdelhafez and
                  George F. Riley},
  title        = {Evaluation of Worm Containment Algorithms and Their Effect on Legitimate
                  Traffic},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {33--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.8},
  doi          = {10.1109/IWIA.2005.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/AbdelhafezR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/AntrosioF05,
  author       = {Joseph V. Antrosio and
                  Errin W. Fulp},
  title        = {Malware Defense Using Network Security Authentication},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {43--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.11},
  doi          = {10.1109/IWIA.2005.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/AntrosioF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/BoyerDC05,
  author       = {Stephen Boyer and
                  Oliver Dain and
                  Robert K. Cunningham},
  title        = {Stellar: {A} Fusion System for Scenario Construction and Security
                  Risk Assessment},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {105--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.16},
  doi          = {10.1109/IWIA.2005.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/BoyerDC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/LikavecW05,
  author       = {Jaromir Likavec and
                  Stephen D. Wolthusen},
  title        = {Enforcing Messaging Security Policies},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {131--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.7},
  doi          = {10.1109/IWIA.2005.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/LikavecW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/LiuBV05,
  author       = {Zhen Liu and
                  Susan M. Bridges and
                  Rayford B. Vaughn},
  title        = {Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion
                  Detection Models},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {164--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.6},
  doi          = {10.1109/IWIA.2005.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/LiuBV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/MathewSU05,
  author       = {Sunu Mathew and
                  Chintan Shah and
                  Shambhu J. Upadhyaya},
  title        = {An Alert Fusion Framework for Situation Awareness of Coordinated Multistage
                  Attacks},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {95--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.3},
  doi          = {10.1109/IWIA.2005.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/MathewSU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/McDermott05,
  author       = {John McDermott},
  title        = {Attack-Potential-Based Survivability Modeling for High-Consequence
                  Systems},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {119--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.4},
  doi          = {10.1109/IWIA.2005.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/McDermott05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/SitaramanV05,
  author       = {Sriranjani Sitaraman and
                  Subbarayan Venkatesan},
  title        = {Forensic Analysis of File System Intrusions Using Improved Backtracking},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {154--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.9},
  doi          = {10.1109/IWIA.2005.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/SitaramanV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/Speirs05,
  author       = {William R. Speirs II},
  title        = {Making the Kernel Responsible: {A} New Approach to Detecting {\&}
                  Preventing Buffer Overflows},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {21--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.10},
  doi          = {10.1109/IWIA.2005.10},
  timestamp    = {Fri, 21 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwia/Speirs05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/SterneBCWTKBTBLR05,
  author       = {Daniel F. Sterne and
                  Poornima Balasubramanyam and
                  David Carman and
                  Brett Wilson and
                  Rajesh Talpade and
                  Calvin Ko and
                  Ravindra Balupari and
                  Chinyang Henry Tseng and
                  Thomas F. Bowen and
                  Karl N. Levitt and
                  Jeff Rowe},
  title        = {A General Cooperative Intrusion Detection Architecture for MANETs},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {57--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.1},
  doi          = {10.1109/IWIA.2005.1},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwia/SterneBCWTKBTBLR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/TolleJBH05,
  author       = {Jens T{\"{o}}lle and
                  Marko Jahnke and
                  Michael Bussmann and
                  Sven Henkel},
  title        = {Meta {IDS} Environments: An Event Message Anomaly Detection Approach},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {85--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.13},
  doi          = {10.1109/IWIA.2005.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/TolleJBH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/VirendraUKA05,
  author       = {Mohit Virendra and
                  Shambhu J. Upadhyaya and
                  Vivek Kumar and
                  Vishal Anand},
  title        = {{SAWAN:} {A} Survivable Architecture for Wireless LANs},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {71--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.15},
  doi          = {10.1109/IWIA.2005.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/VirendraUKA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/YinYS05,
  author       = {Xiaoxin Yin and
                  William Yurcik and
                  Adam J. Slagell},
  title        = {The Design of VisFlowConnect-IP: {A} Link Analysis System for {IP}
                  Security Situational Awareness},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {141--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.17},
  doi          = {10.1109/IWIA.2005.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/YinYS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/YounanJP05,
  author       = {Yves Younan and
                  Wouter Joosen and
                  Frank Piessens},
  title        = {A Methodology for Designing Countermeasures against Current and Future
                  Code Injection Attacks},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {3--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.2},
  doi          = {10.1109/IWIA.2005.2},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/YounanJP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwia/2005,
  title        = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9686/proceeding},
  isbn         = {0-7695-2317-X},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwia/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}