Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/iaw:"
@inproceedings{DBLP:conf/iaw/AslamBKPRT03, author = {Javed A. Aslam and Sergey Bratus and David Kotz and Ronald A. Peterson and Daniela Rus and Brett Tofel}, title = {The Kerf toolkit for intrusion analysis}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {301--302}, publisher = {{IEEE}}, year = {2003}, timestamp = {Tue, 11 Sep 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/AslamBKPRT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/BaldiOY03, author = {Mario Baldi and Yoram Ofek and Moti Yung}, title = {The TrustedFlow {(TM)} Protocol-Idiosyncratic Signatures for Authenticated Execution}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {288--291}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/BaldiOY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/BarlowVO03, author = {David A. Barlow and Vasos Vassiliou and Henry L. Owen}, title = {A Cryptographic Protocol to Protect {MPLS} Labels}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {237--242}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/BarlowVO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/ButlerUP03, author = {James Butler and Jeffrey Undercoffer and John Pinkston}, title = {Hidden Processes: The Implication for Intrusion Detection}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {116--121}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/ButlerUP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/CahillRM03, author = {Thomas P. Cahill and Konstantin Rozinov and Christopher Mul{\'{e}}}, title = {Cyber Warfare Peacekeeping}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {100--107}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/CahillRM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/ChenJSG03, author = {Yong Chen and Christian Damsgaard Jensen and Jean{-}Marc Seigneur and Elizabeth Gray}, title = {Risk Probability Estimating Based on Clustering}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {229--233}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/ChenJSG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/ChinchaniIJU03, author = {Ramkumar Chinchani and Anusha Iyer and Bharat Jayaraman and Shambhu J. Upadhyaya}, title = {Insecure Programming: How Culpable is a Language's Syntax?}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {158--163}, publisher = {{IEEE}}, year = {2003}, timestamp = {Wed, 19 Apr 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/ChinchaniIJU03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Choudhary03, author = {Abdur Rahim Choudhary}, title = {Security-Auditing in a Softswitch}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {292--293}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Choudhary03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Cole03, author = {John L. Cole}, title = {{IEEE} Information Assuurance Activities}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {294--295}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Cole03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/DahelD03, author = {S. K. Dahel and Q. Xiao Dominquez}, title = {Accuracy Performance Analysis of Multimodal Biometrics}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {170--173}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/DahelD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/DeCusatis03, author = {Casimer M. DeCusatis}, title = {Information Assurance for Enterprise Fiber Optic Networks}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {282--287}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/DeCusatis03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/FuGBZ03, author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, title = {On Countermeasures to Traffic Analysis Attacks}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {188--195}, publisher = {{IEEE}}, year = {2003}, timestamp = {Wed, 20 Apr 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/FuGBZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/GonzalezGKD03, author = {Fabio A. Gonz{\'{a}}lez and Jonatan G{\'{o}}mez and Madhavi Kaniganti and Dipankar Dasgupta}, title = {An Evolutionary Approach to Generate Fuzzy Anomaly Signatures}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {251--259}, publisher = {{IEEE}}, year = {2003}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/GonzalezGKD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/GuptaBRU03, author = {Manish Gupta and Shamik Banerjee and H. Raghav Rao and Shambhu J. Upadhyaya}, title = {Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {174--181}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/GuptaBRU03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/HainesGDC03, author = {Joshua W. Haines and Stephen A. Goulet and Robert S. Durst and Terrence G. Champion}, title = {{LLSIM:} Network Simulation for Correlation and Response Testing}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {243--250}, publisher = {{IEEE}}, year = {2003}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/HainesGDC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/HallbergHS03, author = {Jonas Hallberg and Amund Hunstad and Anna Stjerneby}, title = {Identification of {IT} Security-Relevant System Characteristics}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {143--150}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/HallbergHS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Hamilton03, author = {John A. Hamilton Jr.}, title = {Security Vulnerabilities in Command and Control Interoperability}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {164--169}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Hamilton03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/HoffmanRW03, author = {Lance J. Hoffman and Timothy Rosenberg and Steve Willmore}, title = {The Portable Educational Network {(PEN)}}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {217--220}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/HoffmanRW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/JulianRM03, author = {Donald P. Julian and Neil C. Rowe and James Bret Michael}, title = {Experiments with Deceptive Software Responses to Buffer-Based Attacks}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {43--44}, publisher = {{IEEE}}, year = {2003}, timestamp = {Mon, 05 Feb 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/JulianRM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/JuslinV03, author = {Jukka Juslin and Teemupekka Virtanen}, title = {Automatic Backdoor Analysis with Network Intrusion Detection System and Integrated Service Checker}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {122--126}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/JuslinV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Karresand03, author = {Martin Karresand}, title = {Separating Trojan Horses from Viruses and Worms - {A} Proposed Taxonomy of Software Weapons}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {127--134}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Karresand03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/LevineLOCC03, author = {John G. Levine and Richard LaBella and Henry L. Owen and Didier Contis and Brian Culver}, title = {The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {92--99}, publisher = {{IEEE}}, year = {2003}, timestamp = {Thu, 27 Apr 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/LevineLOCC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/LiM03, author = {Jun Li and Constantine N. Manikopoulos}, title = {Early Statistical Anomaly Intrusion Detection of {DOS} Attacks Using {MIB} Traffic Parameters}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {53--59}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/LiM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/LimSLO03, author = {Yu{-}Xi Lim and Tim Schmoyer and John G. Levine and Henry L. Owen}, title = {Wireless Intrusion Detection and Response}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {68--75}, publisher = {{IEEE}}, year = {2003}, timestamp = {Thu, 27 Apr 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/LimSLO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/LucenaCL03, author = {Norka B. Lucena and Steve J. Chapin and Joohan Lee}, title = {Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {135--143}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/LucenaCL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/McCleanSB03, author = {Ingo McLean and Boleslaw K. Szymanski and Alan Bivens}, title = {Methodology of Risk Assessment in Mobile Agent System Design}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {35--42}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 16 Nov 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/McCleanSB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/McCray03, author = {Joe McCray}, title = {A Road Map to Becoming Security Conscious}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {1--9}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/McCray03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/MingyuJG03, author = {Fan Mingyu and Wang Jinahua and Wang Guangwe}, title = {A Design of Hardware Cryptographic Co-Processor}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {234--236}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/MingyuJG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/NguyenRK03, author = {Nam T. Nguyen and Peter L. Reiher and Geoffrey H. Kuenning}, title = {Detecting Insider Threats by Monitoring System Call Activity}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {45--52}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 28 Apr 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/NguyenRK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/NingS03, author = {Peng Ning and Kun Sun}, title = {How to Misuse {AODV:} {A} Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {60--67}, publisher = {{IEEE}}, year = {2003}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/NingS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/PayneR03, author = {Charles N. Payne Jr. and Dorene Kewley Ryder}, title = {On the Large-Scale Deployment of a Distributed Embedded Firewall}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {296--297}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/PayneR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/PhillipsDT03, author = {Charles E. Phillips and Steven A. Demurjian and T. C. Ting}, title = {Security Assurance for an {RBAC/MAC} Security Model}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {260--267}, publisher = {{IEEE}}, year = {2003}, timestamp = {Wed, 13 Jun 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/PhillipsDT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/RagsdaleLD03, author = {Daniel Ragsdale and Scott D. Lathrop and Ronald Dodge}, title = {A Virtual Environment for {IA} Education}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {17--23}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/RagsdaleLD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Ray03, author = {Clark Ray}, title = {A Modest Proposal: Licencsing Personal Computers and Internet Service Providers}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {151--157}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Ray03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Reynolds03, author = {Charles Reynolds}, title = {An Undergraduate Information Assurance Curriculum}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {10--16}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Reynolds03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Reynolds03a, author = {M. Sedano Reynolds}, title = {Next Generation DDoS web based Attacks}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {211--215}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Reynolds03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Rowe03, author = {Neil C. Rowe}, title = {Counterplanning Deceptions To Foil Cyber-Attack Plans}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {203--210}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Rowe03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Rowe03a, author = {Neil C. Rowe}, title = {Counterplanning Deceptions to Foil Cyber Attack-Plans}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {221--228}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Rowe03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/SinghL03, author = {Prabhat K. Singh and Arun Lakhotia}, title = {Static Verification of Worm and virus Behavior in binary Executables using Model Checking}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {298--300}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/SinghL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/TorrellasSD03, author = {Gustavo A. Santana Torrellas and Torella Sarturo and Arturo Torres Dominquez}, title = {Bridge Certification Authorities: Connecting {B2B} Public Key Infrastructure with {PAK} and Zero-Knowledge Proof}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {182--187}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/TorrellasSD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/ValsangkarP03, author = {Amit Valsangkar and Brajendra Panda}, title = {An Architecture for Making Data Available Ceaselessly During Recovery}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {196--202}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/ValsangkarP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/WelchL03, author = {Donald J. Welch and Scott D. Lathrop}, title = {Wirless Security Threat Taxonomy}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {76--83}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/WelchL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/WilsonS03, author = {Perry Wilson and Bruce Shank}, title = {Costs and Benefits of Integrating Biometrics with a Navy Tactical Weapons System}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {303--304}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/WilsonS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Wolthusen03, author = {Stephen D. Wolthusen}, title = {A Distributed Multipurpose Mail Guard (Blinded)}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {268--275}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Wolthusen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/WuZ03, author = {Ningning Wu and Jing Zhang}, title = {Factor Analysis Based Anomaly Detection}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {108--115}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/WuZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/YangZ03, author = {Cungang Yang and Chang N. Zhang}, title = {Secure Web-based Applications with {XML} and {RBAC}}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {276--281}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/YangZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Yasenchock03, author = {David A. Yasenchock}, title = {Army Reserve Information Operations Command Overview}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {305}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Yasenchock03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Young03, author = {Adam L. Young}, title = {Non-Zero Sum Games and Survivable Malware}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {24--29}, publisher = {{IEEE}}, year = {2003}, timestamp = {Sun, 15 Jan 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Young03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/Young03a, author = {Adam L. Young}, title = {A Weakness in Smart Card {PKI} Certification}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {30--34}, publisher = {{IEEE}}, year = {2003}, timestamp = {Sun, 15 Jan 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/Young03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/YuXRBZ03, author = {Wei Yu and Dong Xuan and Sandeep K. Reddy and Riccardo Bettati and Wei Zhao}, title = {Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {84--91}, publisher = {{IEEE}}, year = {2003}, timestamp = {Wed, 20 Apr 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/YuXRBZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/ZuoP03, author = {Yanjun Zuo and Brajendra Panda}, title = {Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {306--307}, publisher = {{IEEE}}, year = {2003}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/ZuoP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iaw/2003, title = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, publisher = {{IEEE}}, year = {2003}, isbn = {0-7803-7808-3}, timestamp = {Fri, 10 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iaw/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.