The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE International Workshop on Information Assurance (iwia)
2006 (conf/iwia/2006)

  1. Simon P. Chung, Aloysius K. Mok
    The LAIDS/LIDS Framework for Systematic IPS Design. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:3-11 [Conf]
  2. Emmanuel Hooper
    An Intelligent Detection and Response Strategy to False Positives and Network Attacks. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:12-31 [Conf]
  3. Bing Chen, Joohan Lee, Annie S. Wu
    Active Event Correlation in Bro IDS to Detect Multi-stage Attacks. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:32-50 [Conf]
  4. Allan Pedersen, Anders Hedegaard, Robin Sharp
    Designing a Secure Point-of-Sale System. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:51-65 [Conf]
  5. Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine
    High Robustness Requirements in a Common Criteria Protection Profile. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:66-78 [Conf]
  6. Qingfeng He, Paul Otto, Annie I. Antón, Laurie Jones
    Ensuring Compliance between Policies, Requirements and Software Design: A Case Study. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:79-92 [Conf]
  7. Suleyman Kondakci
    A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk Management. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:93-102 [Conf]
  8. Nils Aschenbruck, Matthias Frank, Peter Martini, Jens Tölle, Roland Legat, Heinz-Dieter Richmann
    Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:103-108 [Conf]
  9. Hank Rausch
    Jamming Commercial Satellite Communications During Wartime: An Empirical Study. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:109-118 [Conf]
  10. E. Earl Eiland, Lorie M. Liebrock
    An Application of Information Theory to Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:119-134 [Conf]
  11. Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang
    HonIDS: Enhancing Honeypot System with Intrusion Detection Models. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:135-143 [Conf]
  12. Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon
    POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:144-156 [Conf]
  13. Ole Martin Dahl, Stephen D. Wolthusen
    Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:157-168 [Conf]
  14. Kevin Kahley, Manigandan Radhakrishnan, Jon A. Solworth
    Factoring High Level Information Flow Specifications into Low Level Access Controls. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:169-186 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002