default search action
Search dblp for Publications
export results for "toc:db/conf/iwia/iwia2005.bht:"
@inproceedings{DBLP:conf/iwia/AbdelhafezR05, author = {Mohamed Abdelhafez and George F. Riley}, title = {Evaluation of Worm Containment Algorithms and Their Effect on Legitimate Traffic}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {33--42}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.8}, doi = {10.1109/IWIA.2005.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/AbdelhafezR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/AntrosioF05, author = {Joseph V. Antrosio and Errin W. Fulp}, title = {Malware Defense Using Network Security Authentication}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {43--54}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.11}, doi = {10.1109/IWIA.2005.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/AntrosioF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/BoyerDC05, author = {Stephen Boyer and Oliver Dain and Robert K. Cunningham}, title = {Stellar: {A} Fusion System for Scenario Construction and Security Risk Assessment}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {105--116}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.16}, doi = {10.1109/IWIA.2005.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/BoyerDC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/LikavecW05, author = {Jaromir Likavec and Stephen D. Wolthusen}, title = {Enforcing Messaging Security Policies}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {131--138}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.7}, doi = {10.1109/IWIA.2005.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/LikavecW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/LiuBV05, author = {Zhen Liu and Susan M. Bridges and Rayford B. Vaughn}, title = {Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {164--177}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.6}, doi = {10.1109/IWIA.2005.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/LiuBV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/MathewSU05, author = {Sunu Mathew and Chintan Shah and Shambhu J. Upadhyaya}, title = {An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {95--104}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.3}, doi = {10.1109/IWIA.2005.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/MathewSU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/McDermott05, author = {John McDermott}, title = {Attack-Potential-Based Survivability Modeling for High-Consequence Systems}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {119--130}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.4}, doi = {10.1109/IWIA.2005.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/McDermott05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/SitaramanV05, author = {Sriranjani Sitaraman and Subbarayan Venkatesan}, title = {Forensic Analysis of File System Intrusions Using Improved Backtracking}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {154--163}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.9}, doi = {10.1109/IWIA.2005.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/SitaramanV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/Speirs05, author = {William R. Speirs II}, title = {Making the Kernel Responsible: {A} New Approach to Detecting {\&} Preventing Buffer Overflows}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {21--32}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.10}, doi = {10.1109/IWIA.2005.10}, timestamp = {Fri, 21 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwia/Speirs05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/SterneBCWTKBTBLR05, author = {Daniel F. Sterne and Poornima Balasubramanyam and David Carman and Brett Wilson and Rajesh Talpade and Calvin Ko and Ravindra Balupari and Chinyang Henry Tseng and Thomas F. Bowen and Karl N. Levitt and Jeff Rowe}, title = {A General Cooperative Intrusion Detection Architecture for MANETs}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {57--70}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.1}, doi = {10.1109/IWIA.2005.1}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwia/SterneBCWTKBTBLR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/TolleJBH05, author = {Jens T{\"{o}}lle and Marko Jahnke and Michael Bussmann and Sven Henkel}, title = {Meta {IDS} Environments: An Event Message Anomaly Detection Approach}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {85--94}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.13}, doi = {10.1109/IWIA.2005.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/TolleJBH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/VirendraUKA05, author = {Mohit Virendra and Shambhu J. Upadhyaya and Vivek Kumar and Vishal Anand}, title = {{SAWAN:} {A} Survivable Architecture for Wireless LANs}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {71--82}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.15}, doi = {10.1109/IWIA.2005.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/VirendraUKA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/YinYS05, author = {Xiaoxin Yin and William Yurcik and Adam J. Slagell}, title = {The Design of VisFlowConnect-IP: {A} Link Analysis System for {IP} Security Situational Awareness}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {141--153}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.17}, doi = {10.1109/IWIA.2005.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/YinYS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/YounanJP05, author = {Yves Younan and Wouter Joosen and Frank Piessens}, title = {A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {3--20}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.2}, doi = {10.1109/IWIA.2005.2}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/YounanJP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwia/2005, title = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/9686/proceeding}, isbn = {0-7695-2317-X}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwia/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.