Conferences in DBLP
Steven B. Lipner The Trustworthy Computing Security Development Lifecycle. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:2-13 [Conf ] Giovanni Vigna , Sumit Gwalani , Kavitha Srinivasan , Elizabeth M. Belding-Royer , Richard A. Kemmerer An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:16-27 [Conf ] Shai Rubin , Somesh Jha , Barton P. Miller Automatic Generation and Analysis of NIDS Attacks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:28-38 [Conf ] Yan Zhai , Peng Ning , Purush Iyer , Douglas S. Reeves Reasoning About Complementary Intrusion Evidence. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:39-48 [Conf ] Julie Thorpe , Paul C. van Oorschot Towards Secure Design Choices for Implementing Graphical Passwords. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:50-60 [Conf ] Zhuowei Li , Amitabha Das Visualizing and Identifying Intrusion Context from System Calls Trace. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:61-70 [Conf ] J. J. Brennan , Mindy Rudell , Donald B. Faatz , Carson Zimmerman Visualizing Enterprise-Wide Security (VIEWS). [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:71-79 [Conf ] Martin C. Rinard , Cristian Cadar , Daniel Dumitran , Daniel M. Roy , Tudor Leu A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:82-90 [Conf ] Christopher Krügel , William K. Robertson , Giovanni Vigna Detecting Kernel-Level Rootkits Through Binary Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:91-100 [Conf ] Haizhi Xu , Wenliang Du , Steve J. Chapin Detecting Exploit Code Execution in Loadable Kernel Modules. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:101-110 [Conf ] Marshall D. Abrams The Relationship of System & Product Specifications and Evaluations. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:112-113 [Conf ] Ajay Gupta , Daniel C. DuVarney Using Predators to Combat Worms and Viruses: A Simulation-Based Study. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:116-125 [Conf ] Kalyan S. Perumalla , Srikanth Sundaragopalan High-Fidelity Modeling of Computer Network Worms. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:126-135 [Conf ] Guofei Gu , Monirul I. Sharif , Xinzhou Qin , David Dagon , Wenke Lee , George F. Riley Worm Detection, Early Warning and Response Based on Local Victim Information. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:136-145 [Conf ] Hisashi Kojima , Ikuya Morikawa , Yuko Nakayama , Yuji Yamaoka Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:146-155 [Conf ] Emilie Lundin Barse , Erland Jonsson Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:158-167 [Conf ] Jingyu Zhou , Giovanni Vigna Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:168-178 [Conf ] Tzi-cker Chiueh , Dhruv Pilania Design, Implementation, and Evaluation of A Repairable Database Management System. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:179-188 [Conf ] Ramkumar Chinchani , Aarthie Muthukrishnan , Madhusudhanan Chandrasekaran , Shambhu J. Upadhyaya RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:189-204 [Conf ] Marvin Schaefer If A1 is the Answer, What was the Question? An Edgy Na?f's Retrospective on Promulgating the Trusted Computer Systems Evaluation Criteria. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:204-228 [Conf ] Steven M. Bellovin A Look Back at "Security Problems in the TCP/IP Protocol Suite". [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:229-249 [Conf ] Mudhakar Srivatsa , Ling Liu Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:252-261 [Conf ] Ninghui Li , John C. Mitchell , Derrick Tong Securing Java RMI-Based Distributed Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:262-271 [Conf ] Nathanael Paul , David Evans .NET Security: Lessons Learned and Missed from Java. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:272-281 [Conf ] Amit Purohit , Vishnu Navda , Tzi-cker Chiueh Tracing the Root of "Rootable" Processes. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:284-303 [Conf ] John Marchesini , Sean W. Smith , Omen Wild , Joshua Stabiner , Alex Barsamian Open-Source Applications of TCPA Hardware. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:294-303 [Conf ] Suranjan Pramanik , Vidyaraman Sankaranarayanan , Shambhu J. Upadhyaya Security Policies to Mitigate Insider Threat in the Document Control Domain. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:304-313 [Conf ] Kulesh Shanmugasundaram , Mehdi Kharrazi , Nasir D. Memon Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:316-325 [Conf ] Andrew H. Sung , Jianyun Xu , Patrick Chavez , Srinivas Mukkamala Static Analyzer of Vicious Executables (SAVE). [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:326-334 [Conf ] Fu-Hau Hsu , Tzi-cker Chiueh CTCP: A Transparent Centralized TCP/IP Architecture for Network Security. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:335-344 [Conf ] Dick Brackney , Terrance Goan , Allen Ott , Lockheed Martin The Cyber Enemy Within ... Countering the Threat from Malicious Insiders. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:346-347 [Conf ] Steven Noel , Eric Robertson , Sushil Jajodia Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:350-359 [Conf ] Dingbang Xu , Peng Ning Alert Correlation through Triggering Events and Common Resources. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:360-369 [Conf ] Xinzhou Qin , Wenke Lee Attack Plan Recognition and Prediction Using Causal Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:370-379 [Conf ] Carla Marceau , Simon N. Foley Themes and Highlights of the New Security Paradigms Workshop 2004. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:382-383 [Conf ] Sye Loong Keoh , Emil Lupu , Morris Sloman PEACE: A Policy-Based Establishment of Ad-hoc Communities. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:386-395 [Conf ] Ezedin Barka , Ravi S. Sandhu Role-Based Delegation Model/ Hierarchical Roles (RBDM1). [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:396-404 [Conf ] Mohammad A. Al-Kahtani , Ravi S. Sandhu Mohammad A. Al-Kahtani, Ravi Sandhu. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:405-415 [Conf ] Neil C. Rowe Designing Good Deceptions in Defense of Information Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:418-427 [Conf ] Elvis Tombini , Hervé Debar , Ludovic Mé , Mireille Ducassé A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:428-437 [Conf ] Alina Oprea , Dirk Balfanz , Glenn Durfee , Diana K. Smetters Securing a Remote Terminal Application with a Mobile Trusted Device. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:438-447 [Conf ]