C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
DISCEX (1)
2003
2003
2003
Keyphrases
Publications
2003
Steven J. Templeton
,
Karl E. Levitt
Detecting Spoofed Packets.
DISCEX (1)
(2003)
Sudarshan Vasudevan
,
Brian DeCleene
,
Neil Immerman
,
James F. Kurose
,
Donald F. Towsley
Leader Election Algorithms for Wireless Ad Hoc Networks.
DISCEX (1)
(2003)
Yair Amir
,
Cristina Nita-Rotaru
,
Jonathan Robert Stanton
,
Gene Tsudik
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer.
DISCEX (1)
(2003)
Roshan K. Thomas
,
Brian L. Mark
,
Tommy Johnson
,
James Croall
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering.
DISCEX (1)
(2003)
Angelos D. Keromytis
,
Sotiris Ioannidis
,
Michael B. Greenwald
,
Jonathan M. Smith
The STRONGMAN Architecture.
DISCEX (1)
(2003)
D. Nojiri
,
Jeff Rowe
,
Karl N. Levitt
Cooperative Response Strategies for Large Scale Attack Mitigation.
DISCEX (1)
(2003)
Sandra Murphy
,
Abhijit Hayatnagarkar
,
Suresh Krishnaswamy
,
Wayne Morrison
,
Robert Watson
Prophylactic, Treatment and Containment Techniques for Ensuring Active Network Security.
DISCEX (1)
(2003)
Tatyana Ryutov
,
B. Clifford Neuman
,
Dong-Ho Kim
Dynamic Authorization and Intrusion Response in Distributed Systems.
DISCEX (1)
(2003)
Christos Papadopoulos
,
Robert Lindell
,
John Mehringer
,
Alefiya Hussain
,
Ramesh Govindan
COSSACK: Coordinated Suppression of Simultaneous Attacks.
DISCEX (1)
(2003)
W. J. Blackert
,
D. M. Gregg
,
A. K. Castner
,
E. M. Kyle
,
R. L. Hom
,
R. M. Jokerst
Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies.
DISCEX (1)
(2003)
Timothy J. Smith
,
Gregory T. Byrd
,
Xiaoyong Wu
,
Hongjie Xin
,
Krithiga Thangavelu
,
Rong Wang
,
Arpan Shah
Dynamic PKI and Secure Tuplespaces for Distributed Coalitions.
DISCEX (1)
(2003)
Ninghui Li
,
John C. Mitchell
A Role-based Trust-management Framework.
DISCEX (1)
(2003)
David Levin
Lessons Learned in Using Live Red Teams in IA Experiments.
DISCEX (1)
(2003)
Steven Cheung
,
Ulf Lindqvist
,
Martin W. Fong
Modeling Multistep Cyber Attacks for Scenario Recognition.
DISCEX (1)
(2003)
Sava Stanic
,
Suresh Subramaniam
,
Hongsik Choi
,
Gokhan Sahin
,
Hyeong-Ah Choi
Efficient Alarm Management in Optical Networks.
DISCEX (1)
(2003)
Alfonso Valdes
Detecting Novel Scans Through Pattern Anomaly Detection.
DISCEX (1)
(2003)
Robert Watson
,
Brian Feldman
,
Adam Migus
,
Chris Vance
Design and Implementation of the TrustedBSD MAC Framework.
DISCEX (1)
(2003)
Seth Robertson
,
Eric V. Siegel
,
Matthew Miller
,
Salvatore J. Stolfo
Surveillance Detection in High Bandwidth Environments.
DISCEX (1)
(2003)
H. T. Kung
,
Chen-Mou Cheng
,
Koan-Sin Tan
,
Scott O. Bradner
Design and Analysis of an IP-Layer Anonymizing Infrastructure.
DISCEX (1)
(2003)
Crispin Cowan
,
Seth Arnold
,
Steve Beattie
,
Chris Wright
,
John Viega
Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack.
DISCEX (1)
(2003)
Jonathan K. Millen
,
Grit Denker
MuCAPSL.
DISCEX (1)
(2003)
Christoph C. Michael
Finding the Vocabulary of Program Behavior Data for Anomaly Detection.
DISCEX (1)
(2003)
Xiaoliang Zhao
,
Daniel Massey
,
Shyhtsun Felix Wu
,
Mohit Lad
,
Dan Pei
,
Lan Wang
,
Lixia Zhang
Understanding BGP Behavior through a Study of DoD Prefixes.
DISCEX (1)
(2003)
John C. Knight
,
Elisabeth A. Strunk
,
Kevin J. Sullivan
Towards a Rigorous Definition of Information System Survivability.
DISCEX (1)
(2003)
Dick O'Brien
,
Rick Smith
,
Tammy Kappel
,
Clint Bitzer
Intrusion Tolerance Via Network Layer Controls.
DISCEX (1)
(2003)
Laura Feinstein
,
Dan Schnackenberg
,
Ravindra Balupari
,
Darrell Kindred
Statistical Approaches to DDoS Attack Detection and Response.
DISCEX (1)
(2003)
Rui Jiang
,
Vikram Gupta
,
Chinya V. Ravishankar
Interactions Between TCP and the IEEE 802.11 MAC Protocol.
DISCEX (1)
(2003)