The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE International Workshop on Information Assurance (iwia)
2005 (conf/iwia/2005)

  1. Yves Younan, Wouter Joosen, Frank Piessens
    A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:3-20 [Conf]
  2. William R. Speirs
    Making the Kernel Responsible: A New Approach to Detecting & Preventing Buffer Overflows. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:21-32 [Conf]
  3. Mohamed Abdelhafez, George F. Riley
    Evaluation of Worm Containment Algorithms and Their Effect on Legitimate Traffic. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:33-42 [Conf]
  4. Joseph V. Antrosio, Errin W. Fulp
    Malware Defense Using Network Security Authentication. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:43-54 [Conf]
  5. Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chin-Yang Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe
    A General Cooperative Intrusion Detection Architecture for MANETs. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:57-70 [Conf]
  6. Mohit Virendra, Shambhu J. Upadhyaya, Vivek Kumar, Vishal Anand
    SAWAN: A Survivable Architecture for Wireless LANs. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:71-82 [Conf]
  7. Jens Tölle, Marko Jahnke, Michael Bussmann, Sven Henkel
    Meta IDS Environments: An Event Message Anomaly Detection Approach. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:85-94 [Conf]
  8. Sunu Mathew, Chintan Shah, Shambhu J. Upadhyaya
    An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:95-104 [Conf]
  9. Stephen Boyer, Oliver Dain, Robert Cunningham
    Stellar: A Fusion System for Scenario Construction and Security Risk Assessment. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:105-116 [Conf]
  10. John McDermott
    Attack-Potential-Based Survivability Modeling for High-Consequence Systems. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:119-130 [Conf]
  11. Jaromir Likavec, Stephen D. Wolthusen
    Enforcing Messaging Security Policies. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:131-138 [Conf]
  12. Xiaoxin Yin, William Yurcik, Adam J. Slagell
    The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:141-153 [Conf]
  13. Sriranjani Sitaraman, S. Venkatesan
    Forensic Analysis of File System Intrusions Using Improved Backtracking. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:154-163 [Conf]
  14. Zhen Liu, Susan M. Bridges, Rayford B. Vaughn
    Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:164-177 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002