Conferences in DBLP
Joe McCray A Road Map to Becoming Security Conscious. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:1-9 [Conf ] Charles Reynolds An Undergraduate Information Assurance Curriculum. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:10-16 [Conf ] Daniel Ragsdale , Scott D. Lathrop , Ronald Dodge A Virtual Environment for IA Education. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:17-23 [Conf ] Adam Young Non-Zero Sum Games and Survivable Malware. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:24-29 [Conf ] Adam Young A Weakness in Smart Card PKI Certification. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:30-34 [Conf ] Ingo McLean , Boleslaw K. Szymanski , Alan Bivens Methodology of Risk Assessment in Mobile Agent System Design. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:35-42 [Conf ] Donald P. Julian , Neil C. Rowe , James Bret Michael Experiments with Deceptive Software Responses to Buffer-Based Attacks. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:43-44 [Conf ] Nam T. Nguyen , Peter L. Reiher , Geoffrey H. Kuenning Detecting Insider Threats by Monitoring System Call Activity. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:45-52 [Conf ] Jun Li , Constantine N. Manikopoulos Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:53-59 [Conf ] Peng Ning , Kun Sun How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:60-67 [Conf ] Yu-Xi Lim , Tim Schmoyer , John G. Levine , Henry L. Owen Wireless Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:68-75 [Conf ] Donald Welch , Scott Lathrop Wirless Security Threat Taxonomy. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:76-83 [Conf ] Wei Yu , Dong Xuan , Sandeep K. Reddy , Riccardo Bettati , Wei Zhao Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:84-91 [Conf ] John G. Levine , Richard LaBella , Henry L. Owen , Didier Contis , Brian Culver The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:92-99 [Conf ] Thomas P. Cahill , Konstantin Rozinov , Christopher Mulé Cyber Warfare Peacekeeping. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:100-107 [Conf ] Ningning Wu , Jing Zhang Factor Analysis Based Anomaly Detection. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:108-115 [Conf ] James Butler , Jeffrey Undercoffer , John Pinkston Hidden Processes: The Implication for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:116-121 [Conf ] Jukka Juslin , Teemupekka Virtanen Automatic Backdoor Analysis with Network Intrusion Detection System and Integrated Service Checker. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:122-126 [Conf ] Martin Karresand Separating Trojan Horses from Viruses and Worms - A Proposed Taxonomy of Software Weapons. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:127-134 [Conf ] Norka B. Lucena , Steve J. Chapin , Joohan Lee Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:135-143 [Conf ] Jonas Hallberg , Amund Hunstad , Anna Stjerneby Identification of IT Security-Relevant System Characteristics. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:143-150 [Conf ] Clark Ray A Modest Proposal: Licencsing Personal Computers and Internet Service Providers. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:151-157 [Conf ] Ramkumar Chinchani , Anusha Iyer , Bharat Jayaraman , Shambhu J. Upadhyaya Insecure Programming: How Culpable is a Language's Syntax? [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:158-163 [Conf ] John A. Hamilton Jr. Security Vulnerabilities in Command and Control Interoperability. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:164-169 [Conf ] S. K. Dahel , Q. Xiao Dominquez Accuracy Performance Analysis of Multimodal Biometrics. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:170-173 [Conf ] Manish Gupta , Shamik Banerjee , H. Raghav Rao , Shambhu J. Upadhyaya Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:174-181 [Conf ] Gustavo A. Santana Torrellas , Torella Sarturo , Arturo Torres Dominquez Bridge Certification Authorities: Connecting B2B Public Key Infrastructure with PAK and Zero-Knowledge Proof. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:182-187 [Conf ] Xinwen Fu , Bryan Graham , Riccardo Bettati , Wei Zhao On Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:188-195 [Conf ] Amit Valsangkar , Brajendra Panda An Architecture for Making Data Available Ceaselessly During Recovery. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:196-202 [Conf ] Neil C. Rowe Counterplanning Deceptions To Foil Cyber-Attack Plans. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:203-210 [Conf ] M. Sedano Reynolds Next Generation DDoS web based Attacks. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:211-215 [Conf ] Lance J. Hoffman , Timothy Rosenberg , Steve Willmore The Portable Educational Network (PEN). [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:217-220 [Conf ] Neil C. Rowe Counterplanning Deceptions to Foil Cyber Attack-Plans. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:221-228 [Conf ] Yong Chen , Christian Damsgaard Jensen , Jean-Marc Seigneur , Elizabeth Gray Risk Probability Estimating Based on Clustering. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:229-233 [Conf ] Fan Mingyu , Wang Jinahua , Wang Guangwe A Design of Hardware Cryptographic Co-Processor. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:234-236 [Conf ] David A. Barlow , Vasos Vassiliou , Henry L. Owen A Cryptographic Protocol to Protect MPLS Labels. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:237-242 [Conf ] Joshua W. Haines , Stephen A. Goulet , Robert S. Durst , Terrance G. Champion LLSIM: Network Simulation for Correlation and Response Testing. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:243-250 [Conf ] Fabio A. González , Jonatan Gómez , Madhavi Kaniganti , Dipankar Dasgupta An Evolutionary Approach to Generate Fuzzy Anomaly Signatures. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:251-259 [Conf ] Charles E. Phillips , Steven A. Demurjian , T. C. Ting Security Assurance for an RBAC/MAC Security Model. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:260-267 [Conf ] Stephen D. Wolthusen A Distributed Multipurpose Mail Guard (Blinded). [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:268-275 [Conf ] Cungang Yang , Chang N. Zhang Secure Web-based Applications with XML and RBAC. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:276-281 [Conf ] Casimer M. DeCusatis Information Assurance for Enterprise Fiber Optic Networks. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:282-287 [Conf ] Mario Baldi , Yoram Ofek , Moti Yung The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:288-291 [Conf ] Abdur Rahim Choudhary Security-Auditing in a Softswitch. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:292-293 [Conf ] John L. Cole IEEE Information Assuurance Activities. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:294-295 [Conf ] Charles N. Payne Jr. , Dorene Kewley Ryder On the Large-Scale Deployment of a Distributed Embedded Firewall. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:296-297 [Conf ] Prabhat K. Singh , Arun Lakhotia Static Verification of Worm and virus Behavior in binary Executables using Model Checking. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:298-300 [Conf ] Javed A. Aslam , Sergey Bratus , David Kotz , Ronald A. Peterson , Daniela Rus , Brett Tofel The Kerf toolkit for intrusion analysis. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:301-302 [Conf ] Perry Wilson , Bruce Shank Costs and Benefits of Integrating Biometrics with a Navy Tactical Weapons System. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:303-304 [Conf ] David A. Yasenchock Army Reserve Information Operations Command Overview. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:305- [Conf ] Yanjun Zuo , Brajendra Panda Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:306-307 [Conf ]