- 2004
- Gustave Anderson, Leonardo F. Urbano, Gaurav Naik, David J. Dorsey, Andrew Mroczkowski, Donovan Artz, Nicholas Morizio, Andrew Burnheimer, Kris Malfettone, Daniel Lapadat, Evan Sultanik, Saturnino Garcia, Maxim Peysakhov, William C. Regli, Moshe Kam:
A Secure Wireless Agent-based Testbed. IWIA 2004: 19-32 - Giuseppe Ateniese, Chris Riley, Christian Scheideler:
Survivable Monitoring in Dynamic Networks. IWIA 2004: 33-47 - Brian D. Carrier, Blake Matheny:
Methods for Cluster-Based Incident Detection. IWIA 2004: 71-78 - Jerald Dawkins, John Hale:
A Systematic Approach to Multi-Stage Network Attack Analysis. IWIA 2004: 48-58 - Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi:
Packet Filtering for Congestion Control under DoS Attacks. IWIA 2004: 3-18 - Paul A. Karger, Helmut Kurth:
Increased Information Flow Needs for High-Assurance Composite Evaluations. IWIA 2004: 129-140 - Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu:
A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. IWIA 2004: 141-154 - John G. Levine, Julian B. Grizzard, Henry L. Owen:
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. IWIA 2004: 107-128 - Gautam Singaraju, Lawrence Teo, Yuliang Zheng:
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. IWIA 2004: 79-96 - Lawrence Teo, Yu-An Sun, Gail-Joon Ahn:
Defeating Internet Attacks Using Risk Awareness and Active Honeypots. IWIA 2004: 155-168 - John Zachary, John C. McEachen, Daniel W. Ettlich:
Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. IWIA 2004: 59-70 - Ge Zhu, Akhilesh Tyagi:
Protection against Indirect Overflow Attacks on Pointers. IWIA 2004: 97-106 - John L. Cole, Stephen D. Wolthusen:
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA. IEEE Computer Society 2004, ISBN 0-7695-2117-7 [contents] - 2003
- Nicholas Athanasiades, Randal T. Abler, John G. Levine, Henry L. Owen, George F. Riley:
Intrusion Detection Testing and Benchmarking Methodologies. IWIA 2003: 63-72 - Vincent Berk, George Bakos, Robert Morris:
Designing a Framework for Active Worm Detection on Global Networks. IWIA 2003: 13-24 - Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat:
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. IWIA 2003: 25-36 - Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. IWIA 2003: 3-12 - Tim Gibson:
A Guard Architecture for Improved Coalition Operations. IWIA 2003: 89-94 - Volker Hammer:
IT Design Critieria for Damage Reduction. IWIA 2003: 49-62 - John R. James, Frank Mabry:
Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level Issue. IWIA 2003: 109-112 - Cédric Llorens, Denis Valois, Yannick Le Teigner, Alexandre Gibouin:
Computational Complexity of the Network Routing Logical Security Assessment Process. IWIA 2003: 37-48 - Lawrence Teo, Yuliang Zheng, Gail-Joon Ahn:
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. IWIA 2003: 73-88 - Fujita Tomonori, Ogawara Masanori:
Protecting the Integrity of an Entire File System. IWIA 2003: 95-108 - John L. Cole, Stephen D. Wolthusen:
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany. IEEE Computer Society 2003, ISBN 0-7695-2019-7 [contents]