Stop the war!
Остановите войну!
for scientists:
default search action
1. IWIA 2003: Darmstadt, Germany
- John L. Cole, Stephen D. Wolthusen:
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany. IEEE Computer Society 2003, ISBN 0-7695-2019-7
Intrusion Detection I
- Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. 3-12 - Vincent Berk, George Bakos, Robert Morris:
Designing a Framework for Active Worm Detection on Global Networks. 13-24 - Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat:
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. 25-36
Requirements and Metrics
- Cédric Llorens, Denis Valois, Yannick Le Teigner, Alexandre Gibouin:
Computational Complexity of the Network Routing Logical Security Assessment Process. 37-48 - Volker Hammer:
IT Design Critieria for Damage Reduction. 49-62
Intrusion Detection II
- Nicholas Athanasiades, Randal T. Abler, John G. Levine, Henry L. Owen, George F. Riley:
Intrusion Detection Testing and Benchmarking Methodologies. 63-72 - Lawrence Teo, Yuliang Zheng, Gail-Joon Ahn:
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. 73-88
Systems and Applications
- Tim Gibson:
A Guard Architecture for Improved Coalition Operations. 89-94 - Fujita Tomonori, Ogawara Masanori:
Protecting the Integrity of an Entire File System. 95-108
Panel
- John R. James, Frank Mabry:
Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level Issue. 109-112
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.