The SCEAS System
Navigation Menu

Conferences in DBLP

Mathematical Methods, Models, and Architectures for Network Security Systems (MMM-ACNS) (mmmacns)
2005 (conf/mmmacns/2005)

  1. Naranker Dulay, Emil C. Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps
    Self-managed Cells for Ubiquitous Systems. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:1-6 [Conf]
  2. Ming-Yuh Huang
    Critical Information Assurance Challenges for Modern Large-Scale Infrastructures. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:7-22 [Conf]
  3. Vipin Swarup, Sushil Jajodia, Joseph Pamula
    Rule-Based Topological Vulnerability Analysis. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:23-37 [Conf]
  4. David M. Nicol, Michael Liljenstam
    Models and Analysis of Active Worm Defense. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:38-53 [Conf]
  5. Douglas H. Summerville, Victor A. Skormin, Alexander Volynkin, James Moronski
    Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:54-75 [Conf]
  6. Duncan A. Buell
    Calibrating Entropy Functions Applied to Computer Networks. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:76-87 [Conf]
  7. Constantine Daicos, Scott Knight
    A Passive External Web Surveillance Technique for Private Networks. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:88-103 [Conf]
  8. Jacques Demerjian, Ibrahim Hajjeh, Mohamad Badra, Salim Ferraz
    A Secure Way to Combine IPsec, NAT & DHCP. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:104-118 [Conf]
  9. Yonggen Gu, Yuxi Fu, Farong Zhong, Han Zhu
    A Generic Model for Analyzing Security Protocols. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:119-128 [Conf]
  10. Joseph E. Johnson
    Networks, Markov Lie Monoids, and Generalized Entropy. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:129-135 [Conf]
  11. Mikhail I. Smirnov
    Trust by Workflow in Autonomic Communication. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:136-150 [Conf]
  12. Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis
    An Ontology-Based Approach to Information Systems Security Management. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:151-164 [Conf]
  13. Philippe Balbiani, Fahima Cheikh
    Safety Problems in Access Control with Temporal Constraints. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:165-178 [Conf]
  14. Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin
    A Modal Logic for Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:179-193 [Conf]
  15. Peter Schartner, Martin Schaffer
    Unique User-Generated Digital Pseudonyms. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:194-205 [Conf]
  16. Danièle Beauquier, Marie Duflot, Marius Minea
    A Probabilistic Property-Specific Approach to Information Flow. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:206-220 [Conf]
  17. Roberto Giacobazzi, Isabella Mastroeni
    Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:221-234 [Conf]
  18. Alexander Grusho, Alexander Kniazev, Elena Timonina
    Detection of Illegal Information Flow. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:235-244 [Conf]
  19. Gang Yin, Huaimin Wang, Dian-xi Shi, Haiya Gu
    Towards More Controllable and Practical Delegation. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:245-258 [Conf]
  20. Félix J. García Clemente, Jesús D. Jiménez Re, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta
    Policy-Driven Routing Management Using CIM. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:259-271 [Conf]
  21. Dmitry P. Zegzhda, Alex M. Vovk
    Secure Hybrid Operating System "Linux over Fenix". [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:272-285 [Conf]
  22. Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He
    A Formal Description of SECIMOS Operating System. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:286-297 [Conf]
  23. Fabrizio Baiardi, Claudio Telmon
    A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:298-310 [Conf]
  24. Igor V. Kotenko, Mikhail Stepashkin
    Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:311-324 [Conf]
  25. Slim Rekhis, Noureddine Boudriga
    A Temporal Logic-Based Model for Forensic Investigation in Networked System Security. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:325-338 [Conf]
  26. Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin
    Vulnerabilities Detection in the Configurations of MS Windows Operating System. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:339-351 [Conf]
  27. Abdulrahman Alharby, Hideki Imai
    Hybrid Intrusion Detection Model Based on Ordered Sequences. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:352-365 [Conf]
  28. Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov, Alexander Ulanov
    Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:366-379 [Conf]
  29. Victor Serdiouk
    Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:380-393 [Conf]
  30. Alexander O. Tarakanov, Sergei V. Kvachev, Alexander V. Sukhorukov
    A Formal Immune Network and Its Implementation for On-line Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:394-405 [Conf]
  31. Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen
    Foundation for a Time Interval Access Control Model. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:406-411 [Conf]
  32. Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin
    Developing an Insider Threat Model Using Functional Decomposition. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:412-417 [Conf]
  33. Félix J. García Clemente, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta
    An XML-Seamless Policy Based Management Framework. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:418-423 [Conf]
  34. Alexei Galatenko, Alexander Grusho, Alexander Kniazev, Elena Timonina
    Statistical Covert Channels Through PROXY Server. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:424-429 [Conf]
  35. Ernö Jeges, Zoltán Hornák, Csaba Körmöczi
    Encoding Private Key in Fingerprint. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:430-435 [Conf]
  36. Soon Seok Kim, Sang Soo Yeo, Hong-Jin Park, Sung Kwon Kim
    A New Scheme for the Location Information Protection in Mobile Communication Environments. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:436-441 [Conf]
  37. Wojciech Molisz, Jacek Rak
    Region Protection/Restoration Scheme in Survivable Networks. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:442-447 [Conf]
  38. Udo Payer, Peter Teufl, Stefan Kraxberger, Mario Lamberger
    Massive Data Mining for Polymorphic Code Detection. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:448-453 [Conf]
  39. Martin Schaffer, Peter Schartner
    Key Escrow with Tree-Based Access Structure. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:454-459 [Conf]
  40. Artem Tishkov, Igor V. Kotenko, Ekaterina Sidelnikova
    Security Checker Architecture for Policy-Based Security Management. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:460-465 [Conf]
  41. Soomi Yang
    An Efficient Access Control Model Utilized the Attribute Certificate Structuring. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:466-471 [Conf]
  42. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Secure Protected Password Change Scheme. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:472-477 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002