default search action
IAW 2003: West Point, New York, USA
- IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA. IEEE 2003, ISBN 0-7803-7808-3
Information Assurance Education
- Joe McCray:
A Road Map to Becoming Security Conscious. IAW 2003: 1-9 - Charles Reynolds:
An Undergraduate Information Assurance Curriculum. IAW 2003: 10-16 - Daniel Ragsdale, Scott D. Lathrop, Ronald Dodge:
A Virtual Environment for IA Education. IAW 2003: 17-23
Viruses and Mobile Agents
- Adam L. Young:
Non-Zero Sum Games and Survivable Malware. IAW 2003: 24-29 - Adam L. Young:
A Weakness in Smart Card PKI Certification. IAW 2003: 30-34 - Ingo McLean, Boleslaw K. Szymanski, Alan Bivens:
Methodology of Risk Assessment in Mobile Agent System Design. IAW 2003: 35-42
Intrusion Detection I
- Donald P. Julian, Neil C. Rowe, James Bret Michael:
Experiments with Deceptive Software Responses to Buffer-Based Attacks. IAW 2003: 43-44 - Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning:
Detecting Insider Threats by Monitoring System Call Activity. IAW 2003: 45-52 - Jun Li, Constantine N. Manikopoulos:
Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. IAW 2003: 53-59
Wireless Security & Ad Hoc Networks
- Peng Ning, Kun Sun:
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. IAW 2003: 60-67 - Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen:
Wireless Intrusion Detection and Response. IAW 2003: 68-75 - Donald J. Welch, Scott D. Lathrop:
Wirless Security Threat Taxonomy. IAW 2003: 76-83
Policy and Defensive Measures
- Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao:
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. IAW 2003: 84-91 - John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver:
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. IAW 2003: 92-99 - Thomas P. Cahill, Konstantin Rozinov, Christopher Mulé:
Cyber Warfare Peacekeeping. IAW 2003: 100-107
Intrusion Detection
- Ningning Wu, Jing Zhang:
Factor Analysis Based Anomaly Detection. IAW 2003: 108-115 - James Butler, Jeffrey Undercoffer, John Pinkston:
Hidden Processes: The Implication for Intrusion Detection. IAW 2003: 116-121 - Jukka Juslin, Teemupekka Virtanen:
Automatic Backdoor Analysis with Network Intrusion Detection System and Integrated Service Checker. IAW 2003: 122-126
Theory
- Martin Karresand:
Separating Trojan Horses from Viruses and Worms - A Proposed Taxonomy of Software Weapons. IAW 2003: 127-134 - Norka B. Lucena, Steve J. Chapin, Joohan Lee:
Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency. IAW 2003: 135-143 - Jonas Hallberg, Amund Hunstad, Anna Stjerneby:
Identification of IT Security-Relevant System Characteristics. IAW 2003: 143-150
Pre-Planned Security
- Clark Ray:
A Modest Proposal: Licencsing Personal Computers and Internet Service Providers. IAW 2003: 151-157 - Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya:
Insecure Programming: How Culpable is a Language's Syntax? IAW 2003: 158-163 - John A. Hamilton Jr.:
Security Vulnerabilities in Command and Control Interoperability. IAW 2003: 164-169
Authentication and Access Control
- S. K. Dahel, Q. Xiao Dominquez:
Accuracy Performance Analysis of Multimodal Biometrics. IAW 2003: 170-173 - Manish Gupta, Shamik Banerjee, H. Raghav Rao, Shambhu J. Upadhyaya:
Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security. IAW 2003: 174-181 - Gustavo A. Santana Torrellas, Torella Sarturo, Arturo Torres Dominquez:
Bridge Certification Authorities: Connecting B2B Public Key Infrastructure with PAK and Zero-Knowledge Proof. IAW 2003: 182-187
Intrusion Response and Recovery
- Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Countermeasures to Traffic Analysis Attacks. IAW 2003: 188-195 - Amit Valsangkar, Brajendra Panda:
An Architecture for Making Data Available Ceaselessly During Recovery. IAW 2003: 196-202 - Neil C. Rowe:
Counterplanning Deceptions To Foil Cyber-Attack Plans. IAW 2003: 203-210
Advanced Topics I
- M. Sedano Reynolds:
Next Generation DDoS web based Attacks. IAW 2003: 211-215 - Lance J. Hoffman, Timothy Rosenberg, Steve Willmore:
The Portable Educational Network (PEN). IAW 2003: 217-220
Risk Analysis
- Neil C. Rowe:
Counterplanning Deceptions to Foil Cyber Attack-Plans. IAW 2003: 221-228 - Yong Chen, Christian Damsgaard Jensen, Jean-Marc Seigneur, Elizabeth Gray:
Risk Probability Estimating Based on Clustering. IAW 2003: 229-233
Cryptography
- Fan Mingyu, Wang Jinahua, Wang Guangwe:
A Design of Hardware Cryptographic Co-Processor. IAW 2003: 234-236 - David A. Barlow, Vasos Vassiliou, Henry L. Owen:
A Cryptographic Protocol to Protect MPLS Labels. IAW 2003: 237-242
Defensive Techniques
- Joshua W. Haines, Stephen A. Goulet, Robert S. Durst, Terrence G. Champion:
LLSIM: Network Simulation for Correlation and Response Testing. IAW 2003: 243-250 - Fabio A. González, Jonatan Gómez, Madhavi Kaniganti, Dipankar Dasgupta:
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures. IAW 2003: 251-259 - Charles E. Phillips, Steven A. Demurjian, T. C. Ting:
Security Assurance for an RBAC/MAC Security Model. IAW 2003: 260-267
Advanced Topics II
- Stephen D. Wolthusen:
A Distributed Multipurpose Mail Guard (Blinded). IAW 2003: 268-275 - Cungang Yang, Chang N. Zhang:
Secure Web-based Applications with XML and RBAC. IAW 2003: 276-281 - Casimer M. DeCusatis:
Information Assurance for Enterprise Fiber Optic Networks. IAW 2003: 282-287
Poster Session
- Mario Baldi, Yoram Ofek, Moti Yung:
The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution. IAW 2003: 288-291 - Abdur Rahim Choudhary:
Security-Auditing in a Softswitch. IAW 2003: 292-293 - John L. Cole:
IEEE Information Assuurance Activities. IAW 2003: 294-295 - Charles N. Payne Jr., Dorene Kewley Ryder:
On the Large-Scale Deployment of a Distributed Embedded Firewall. IAW 2003: 296-297 - Prabhat K. Singh, Arun Lakhotia:
Static Verification of Worm and virus Behavior in binary Executables using Model Checking. IAW 2003: 298-300 - Javed A. Aslam, Sergey Bratus, David Kotz, Ronald A. Peterson, Daniela Rus, Brett Tofel:
The Kerf toolkit for intrusion analysis. IAW 2003: 301-302 - Perry Wilson, Bruce Shank:
Costs and Benefits of Integrating Biometrics with a Navy Tactical Weapons System. IAW 2003: 303-304 - David A. Yasenchock:
Army Reserve Information Operations Command Overview. IAW 2003: 305 - Yanjun Zuo, Brajendra Panda:
Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. IAW 2003: 306-307
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.