Sign in
IAW
2003
2003
2003
Keyphrases
Publications
2003
Clark Ray
A Modest Proposal: Licencsing Personal Computers and Internet Service Providers.
IAW
(2003)
Yu-Xi Lim
,
Tim Schmoyer
,
John G. Levine
,
Henry L. Owen
Wireless Intrusion Detection and Response.
IAW
(2003)
Peng Ning
,
Kun Sun
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols.
IAW
(2003)
Jukka Juslin
,
Teemupekka Virtanen
Automatic Backdoor Analysis with Network Intrusion Detection System and Integrated Service Checker.
IAW
(2003)
Adam L. Young
A Weakness in Smart Card PKI Certification.
IAW
(2003)
John A. Hamilton Jr.
Security Vulnerabilities in Command and Control Interoperability.
IAW
(2003)
Charles N. Payne Jr.
,
Dorene Kewley Ryder
On the Large-Scale Deployment of a Distributed Embedded Firewall.
IAW
(2003)
Fabio A. González
,
Jonatan Gómez
,
Madhavi Kaniganti
,
Dipankar Dasgupta
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures.
IAW
(2003)
Casimer M. DeCusatis
Information Assurance for Enterprise Fiber Optic Networks.
IAW
(2003)
Charles Reynolds
An Undergraduate Information Assurance Curriculum.
IAW
(2003)
Thomas P. Cahill
,
Konstantin Rozinov
,
Christopher Mulé
Cyber Warfare Peacekeeping.
IAW
(2003)
John L. Cole
IEEE Information Assuurance Activities.
IAW
(2003)
Daniel Ragsdale
,
Scott D. Lathrop
,
Ronald Dodge
A Virtual Environment for IA Education.
IAW
(2003)
Neil C. Rowe
Counterplanning Deceptions to Foil Cyber Attack-Plans.
IAW
(2003)
Joe McCray
A Road Map to Becoming Security Conscious.
IAW
(2003)
Donald P. Julian
,
Neil C. Rowe
,
James Bret Michael
Experiments with Deceptive Software Responses to Buffer-Based Attacks.
IAW
(2003)
Yong Chen
,
Christian Damsgaard Jensen
,
Jean-Marc Seigneur
,
Elizabeth Gray
Risk Probability Estimating Based on Clustering.
IAW
(2003)
Martin Karresand
Separating Trojan Horses from Viruses and Worms - A Proposed Taxonomy of Software Weapons.
IAW
(2003)
David A. Barlow
,
Vasos Vassiliou
,
Henry L. Owen
A Cryptographic Protocol to Protect MPLS Labels.
IAW
(2003)
Javed A. Aslam
,
Sergey Bratus
,
David Kotz
,
Ronald A. Peterson
,
Daniela Rus
,
Brett Tofel
The Kerf toolkit for intrusion analysis.
IAW
(2003)
Yanjun Zuo
,
Brajendra Panda
Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs.
IAW
(2003)
Charles E. Phillips
,
Steven A. Demurjian
,
T. C. Ting
Security Assurance for an RBAC/MAC Security Model.
IAW
(2003)
Jonas Hallberg
,
Amund Hunstad
,
Anna Stjerneby
Identification of IT Security-Relevant System Characteristics.
IAW
(2003)
Gustavo A. Santana Torrellas
,
Torella Sarturo
,
Arturo Torres Dominquez
Bridge Certification Authorities: Connecting B2B Public Key Infrastructure with PAK and Zero-Knowledge Proof.
IAW
(2003)
Neil C. Rowe
Counterplanning Deceptions To Foil Cyber-Attack Plans.
IAW
(2003)
S. K. Dahel
,
Q. Xiao Dominquez
Accuracy Performance Analysis of Multimodal Biometrics.
IAW
(2003)
Ingo McLean
,
Boleslaw K. Szymanski
,
Alan Bivens
Methodology of Risk Assessment in Mobile Agent System Design.
IAW
(2003)
Stephen D. Wolthusen
A Distributed Multipurpose Mail Guard (Blinded).
IAW
(2003)
Amit Valsangkar
,
Brajendra Panda
An Architecture for Making Data Available Ceaselessly During Recovery.
IAW
(2003)
Lance J. Hoffman
,
Timothy Rosenberg
,
Steve Willmore
The Portable Educational Network (PEN).
IAW
(2003)
Ningning Wu
,
Jing Zhang
Factor Analysis Based Anomaly Detection.
IAW
(2003)
John G. Levine
,
Richard LaBella
,
Henry L. Owen
,
Didier Contis
,
Brian Culver
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.
IAW
(2003)
Norka B. Lucena
,
Steve J. Chapin
,
Joohan Lee
Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency.
IAW
(2003)
David A. Yasenchock
Army Reserve Information Operations Command Overview.
IAW
(2003)
Xinwen Fu
,
Bryan Graham
,
Riccardo Bettati
,
Wei Zhao
On Countermeasures to Traffic Analysis Attacks.
IAW
(2003)
Donald J. Welch
,
Scott D. Lathrop
Wirless Security Threat Taxonomy.
IAW
(2003)
James Butler
,
Jeffrey Undercoffer
,
John Pinkston
Hidden Processes: The Implication for Intrusion Detection.
IAW
(2003)
Wei Yu
,
Dong Xuan
,
Sandeep K. Reddy
,
Riccardo Bettati
,
Wei Zhao
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks.
IAW
(2003)
Prabhat K. Singh
,
Arun Lakhotia
Static Verification of Worm and virus Behavior in binary Executables using Model Checking.
IAW
(2003)
Jun Li
,
Constantine N. Manikopoulos
Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters.
IAW
(2003)
Cungang Yang
,
Chang N. Zhang
Secure Web-based Applications with XML and RBAC.
IAW
(2003)
M. Sedano Reynolds
Next Generation DDoS web based Attacks.
IAW
(2003)
Ramkumar Chinchani
,
Anusha Iyer
,
Bharat Jayaraman
,
Shambhu J. Upadhyaya
Insecure Programming: How Culpable is a Language's Syntax?
IAW
(2003)
Mario Baldi
,
Yoram Ofek
,
Moti Yung
The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution.
IAW
(2003)
Perry Wilson
,
Bruce Shank
Costs and Benefits of Integrating Biometrics with a Navy Tactical Weapons System.
IAW
(2003)
Joshua W. Haines
,
Stephen A. Goulet
,
Robert S. Durst
,
Terrance G. Champion
LLSIM: Network Simulation for Correlation and Response Testing.
IAW
(2003)
Adam L. Young
Non-Zero Sum Games and Survivable Malware.
IAW
(2003)
Fan Mingyu
,
Wang Jinahua
,
Wang Guangwe
A Design of Hardware Cryptographic Co-Processor.
IAW
(2003)
Nam T. Nguyen
,
Peter L. Reiher
,
Geoffrey H. Kuenning
Detecting Insider Threats by Monitoring System Call Activity.
IAW
(2003)
IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA
IAW
(2003)