The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE International Workshop on Information Assurance (iwia)
2004 (conf/iwia/2004)

  1. Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi
    Packet Filtering for Congestion Control under DoS Attacks. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:3-18 [Conf]
  2. Gustave Anderson, Leonardo Urbano, Gaurav Naik, David Dorsey, Andrew Mroczkowski, Donovan Artz, Nicholas Morizio, Andrew Burnheimer, Kris Malfettone, Daniel Lapadat, Evan Sultanik, Saturnino Garcia, Maxim Peysakhov, William C. Regli, Moshe Kam
    A Secure Wireless Agent-based Testbed. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:19-32 [Conf]
  3. Giuseppe Ateniese, Chris Riley, Christian Scheideler
    Survivable Monitoring in Dynamic Networks. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:33-47 [Conf]
  4. Jerald Dawkins, John Hale
    A Systematic Approach to Multi-Stage Network Attack Analysis. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:48-58 [Conf]
  5. John Zachary, John C. McEachen, Daniel W. Ettlich
    Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:59-70 [Conf]
  6. Brian D. Carrier, Blake Matheny
    Methods for Cluster-Based Incident Detection. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:71-78 [Conf]
  7. Gautam Singaraju, Lawrence Teo, Yuliang Zheng
    A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:79-96 [Conf]
  8. Ge Zhu, Akhilesh Tyagi
    Protection against Indirect Overflow Attacks on Pointers. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:97-106 [Conf]
  9. John G. Levine, Julian B. Grizzard, Henry L. Owen
    A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:107-128 [Conf]
  10. Paul A. Karger, Helmut Kurth
    Increased Information Flow Needs for High-Assurance Composite Evaluations. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:129-140 [Conf]
  11. Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu
    A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:141-154 [Conf]
  12. Lawrence Teo, Yu-An Sun, Gail-Joon Ahn
    Defeating Internet Attacks Using Risk Awareness and Active Honeypots. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:155-168 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002