The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Information Assurance Workshop (iaw)
2003 (conf/iaw/2003)

  1. Joe McCray
    A Road Map to Becoming Security Conscious. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:1-9 [Conf]
  2. Charles Reynolds
    An Undergraduate Information Assurance Curriculum. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:10-16 [Conf]
  3. Daniel Ragsdale, Scott D. Lathrop, Ronald Dodge
    A Virtual Environment for IA Education. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:17-23 [Conf]
  4. Adam Young
    Non-Zero Sum Games and Survivable Malware. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:24-29 [Conf]
  5. Adam Young
    A Weakness in Smart Card PKI Certification. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:30-34 [Conf]
  6. Ingo McLean, Boleslaw K. Szymanski, Alan Bivens
    Methodology of Risk Assessment in Mobile Agent System Design. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:35-42 [Conf]
  7. Donald P. Julian, Neil C. Rowe, James Bret Michael
    Experiments with Deceptive Software Responses to Buffer-Based Attacks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:43-44 [Conf]
  8. Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning
    Detecting Insider Threats by Monitoring System Call Activity. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:45-52 [Conf]
  9. Jun Li, Constantine N. Manikopoulos
    Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:53-59 [Conf]
  10. Peng Ning, Kun Sun
    How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:60-67 [Conf]
  11. Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen
    Wireless Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:68-75 [Conf]
  12. Donald Welch, Scott Lathrop
    Wirless Security Threat Taxonomy. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:76-83 [Conf]
  13. Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao
    Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:84-91 [Conf]
  14. John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver
    The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:92-99 [Conf]
  15. Thomas P. Cahill, Konstantin Rozinov, Christopher Mulé
    Cyber Warfare Peacekeeping. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:100-107 [Conf]
  16. Ningning Wu, Jing Zhang
    Factor Analysis Based Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:108-115 [Conf]
  17. James Butler, Jeffrey Undercoffer, John Pinkston
    Hidden Processes: The Implication for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:116-121 [Conf]
  18. Jukka Juslin, Teemupekka Virtanen
    Automatic Backdoor Analysis with Network Intrusion Detection System and Integrated Service Checker. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:122-126 [Conf]
  19. Martin Karresand
    Separating Trojan Horses from Viruses and Worms - A Proposed Taxonomy of Software Weapons. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:127-134 [Conf]
  20. Norka B. Lucena, Steve J. Chapin, Joohan Lee
    Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:135-143 [Conf]
  21. Jonas Hallberg, Amund Hunstad, Anna Stjerneby
    Identification of IT Security-Relevant System Characteristics. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:143-150 [Conf]
  22. Clark Ray
    A Modest Proposal: Licencsing Personal Computers and Internet Service Providers. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:151-157 [Conf]
  23. Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya
    Insecure Programming: How Culpable is a Language's Syntax? [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:158-163 [Conf]
  24. John A. Hamilton Jr.
    Security Vulnerabilities in Command and Control Interoperability. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:164-169 [Conf]
  25. S. K. Dahel, Q. Xiao Dominquez
    Accuracy Performance Analysis of Multimodal Biometrics. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:170-173 [Conf]
  26. Manish Gupta, Shamik Banerjee, H. Raghav Rao, Shambhu J. Upadhyaya
    Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:174-181 [Conf]
  27. Gustavo A. Santana Torrellas, Torella Sarturo, Arturo Torres Dominquez
    Bridge Certification Authorities: Connecting B2B Public Key Infrastructure with PAK and Zero-Knowledge Proof. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:182-187 [Conf]
  28. Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:188-195 [Conf]
  29. Amit Valsangkar, Brajendra Panda
    An Architecture for Making Data Available Ceaselessly During Recovery. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:196-202 [Conf]
  30. Neil C. Rowe
    Counterplanning Deceptions To Foil Cyber-Attack Plans. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:203-210 [Conf]
  31. M. Sedano Reynolds
    Next Generation DDoS web based Attacks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:211-215 [Conf]
  32. Lance J. Hoffman, Timothy Rosenberg, Steve Willmore
    The Portable Educational Network (PEN). [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:217-220 [Conf]
  33. Neil C. Rowe
    Counterplanning Deceptions to Foil Cyber Attack-Plans. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:221-228 [Conf]
  34. Yong Chen, Christian Damsgaard Jensen, Jean-Marc Seigneur, Elizabeth Gray
    Risk Probability Estimating Based on Clustering. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:229-233 [Conf]
  35. Fan Mingyu, Wang Jinahua, Wang Guangwe
    A Design of Hardware Cryptographic Co-Processor. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:234-236 [Conf]
  36. David A. Barlow, Vasos Vassiliou, Henry L. Owen
    A Cryptographic Protocol to Protect MPLS Labels. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:237-242 [Conf]
  37. Joshua W. Haines, Stephen A. Goulet, Robert S. Durst, Terrance G. Champion
    LLSIM: Network Simulation for Correlation and Response Testing. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:243-250 [Conf]
  38. Fabio A. González, Jonatan Gómez, Madhavi Kaniganti, Dipankar Dasgupta
    An Evolutionary Approach to Generate Fuzzy Anomaly Signatures. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:251-259 [Conf]
  39. Charles E. Phillips, Steven A. Demurjian, T. C. Ting
    Security Assurance for an RBAC/MAC Security Model. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:260-267 [Conf]
  40. Stephen D. Wolthusen
    A Distributed Multipurpose Mail Guard (Blinded). [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:268-275 [Conf]
  41. Cungang Yang, Chang N. Zhang
    Secure Web-based Applications with XML and RBAC. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:276-281 [Conf]
  42. Casimer M. DeCusatis
    Information Assurance for Enterprise Fiber Optic Networks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:282-287 [Conf]
  43. Mario Baldi, Yoram Ofek, Moti Yung
    The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:288-291 [Conf]
  44. Abdur Rahim Choudhary
    Security-Auditing in a Softswitch. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:292-293 [Conf]
  45. John L. Cole
    IEEE Information Assuurance Activities. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:294-295 [Conf]
  46. Charles N. Payne Jr., Dorene Kewley Ryder
    On the Large-Scale Deployment of a Distributed Embedded Firewall. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:296-297 [Conf]
  47. Prabhat K. Singh, Arun Lakhotia
    Static Verification of Worm and virus Behavior in binary Executables using Model Checking. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:298-300 [Conf]
  48. Javed A. Aslam, Sergey Bratus, David Kotz, Ronald A. Peterson, Daniela Rus, Brett Tofel
    The Kerf toolkit for intrusion analysis. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:301-302 [Conf]
  49. Perry Wilson, Bruce Shank
    Costs and Benefits of Integrating Biometrics with a Navy Tactical Weapons System. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:303-304 [Conf]
  50. David A. Yasenchock
    Army Reserve Information Operations Command Overview. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:305- [Conf]
  51. Yanjun Zuo, Brajendra Panda
    Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:306-307 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002