Conferences in DBLP
Yves Younan , Wouter Joosen , Frank Piessens A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:3-20 [Conf ] William R. Speirs Making the Kernel Responsible: A New Approach to Detecting & Preventing Buffer Overflows. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:21-32 [Conf ] Mohamed Abdelhafez , George F. Riley Evaluation of Worm Containment Algorithms and Their Effect on Legitimate Traffic. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:33-42 [Conf ] Joseph V. Antrosio , Errin W. Fulp Malware Defense Using Network Security Authentication. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:43-54 [Conf ] Daniel F. Sterne , Poornima Balasubramanyam , David Carman , Brett Wilson , Rajesh Talpade , Calvin Ko , Ravindra Balupari , Chin-Yang Tseng , Thomas F. Bowen , Karl N. Levitt , Jeff Rowe A General Cooperative Intrusion Detection Architecture for MANETs. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:57-70 [Conf ] Mohit Virendra , Shambhu J. Upadhyaya , Vivek Kumar , Vishal Anand SAWAN: A Survivable Architecture for Wireless LANs. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:71-82 [Conf ] Jens Tölle , Marko Jahnke , Michael Bussmann , Sven Henkel Meta IDS Environments: An Event Message Anomaly Detection Approach. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:85-94 [Conf ] Sunu Mathew , Chintan Shah , Shambhu J. Upadhyaya An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:95-104 [Conf ] Stephen Boyer , Oliver Dain , Robert Cunningham Stellar: A Fusion System for Scenario Construction and Security Risk Assessment. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:105-116 [Conf ] John McDermott Attack-Potential-Based Survivability Modeling for High-Consequence Systems. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:119-130 [Conf ] Jaromir Likavec , Stephen D. Wolthusen Enforcing Messaging Security Policies. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:131-138 [Conf ] Xiaoxin Yin , William Yurcik , Adam J. Slagell The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:141-153 [Conf ] Sriranjani Sitaraman , S. Venkatesan Forensic Analysis of File System Intrusions Using Improved Backtracking. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:154-163 [Conf ] Zhen Liu , Susan M. Bridges , Rayford B. Vaughn Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:164-177 [Conf ]