Search dblp for Publications

export results for "stream:streams/conf/iaw:"

 download as .bib file

@inproceedings{DBLP:conf/iaw/AslamBKPRT03,
  author       = {Javed A. Aslam and
                  Sergey Bratus and
                  David Kotz and
                  Ronald A. Peterson and
                  Daniela Rus and
                  Brett Tofel},
  title        = {The Kerf toolkit for intrusion analysis},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {301--302},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Tue, 11 Sep 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/AslamBKPRT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/BaldiOY03,
  author       = {Mario Baldi and
                  Yoram Ofek and
                  Moti Yung},
  title        = {The TrustedFlow {(TM)} Protocol-Idiosyncratic Signatures for Authenticated
                  Execution},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {288--291},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/BaldiOY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/BarlowVO03,
  author       = {David A. Barlow and
                  Vasos Vassiliou and
                  Henry L. Owen},
  title        = {A Cryptographic Protocol to Protect {MPLS} Labels},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {237--242},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/BarlowVO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/ButlerUP03,
  author       = {James Butler and
                  Jeffrey Undercoffer and
                  John Pinkston},
  title        = {Hidden Processes: The Implication for Intrusion Detection},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {116--121},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/ButlerUP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/CahillRM03,
  author       = {Thomas P. Cahill and
                  Konstantin Rozinov and
                  Christopher Mul{\'{e}}},
  title        = {Cyber Warfare Peacekeeping},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {100--107},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/CahillRM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/ChenJSG03,
  author       = {Yong Chen and
                  Christian Damsgaard Jensen and
                  Jean{-}Marc Seigneur and
                  Elizabeth Gray},
  title        = {Risk Probability Estimating Based on Clustering},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {229--233},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/ChenJSG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/ChinchaniIJU03,
  author       = {Ramkumar Chinchani and
                  Anusha Iyer and
                  Bharat Jayaraman and
                  Shambhu J. Upadhyaya},
  title        = {Insecure Programming: How Culpable is a Language's Syntax?},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {158--163},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Wed, 19 Apr 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/ChinchaniIJU03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Choudhary03,
  author       = {Abdur Rahim Choudhary},
  title        = {Security-Auditing in a Softswitch},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {292--293},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Choudhary03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Cole03,
  author       = {John L. Cole},
  title        = {{IEEE} Information Assuurance Activities},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {294--295},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Cole03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/DahelD03,
  author       = {S. K. Dahel and
                  Q. Xiao Dominquez},
  title        = {Accuracy Performance Analysis of Multimodal Biometrics},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {170--173},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/DahelD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/DeCusatis03,
  author       = {Casimer M. DeCusatis},
  title        = {Information Assurance for Enterprise Fiber Optic Networks},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {282--287},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/DeCusatis03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/FuGBZ03,
  author       = {Xinwen Fu and
                  Bryan Graham and
                  Riccardo Bettati and
                  Wei Zhao},
  title        = {On Countermeasures to Traffic Analysis Attacks},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {188--195},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Wed, 20 Apr 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/FuGBZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/GonzalezGKD03,
  author       = {Fabio A. Gonz{\'{a}}lez and
                  Jonatan G{\'{o}}mez and
                  Madhavi Kaniganti and
                  Dipankar Dasgupta},
  title        = {An Evolutionary Approach to Generate Fuzzy Anomaly Signatures},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {251--259},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/GonzalezGKD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/GuptaBRU03,
  author       = {Manish Gupta and
                  Shamik Banerjee and
                  H. Raghav Rao and
                  Shambhu J. Upadhyaya},
  title        = {Intrusion Countermeasures Security Model Based on Prioritization Scheme
                  for Intranet Access Security},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {174--181},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/GuptaBRU03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/HainesGDC03,
  author       = {Joshua W. Haines and
                  Stephen A. Goulet and
                  Robert S. Durst and
                  Terrence G. Champion},
  title        = {{LLSIM:} Network Simulation for Correlation and Response Testing},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {243--250},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/HainesGDC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/HallbergHS03,
  author       = {Jonas Hallberg and
                  Amund Hunstad and
                  Anna Stjerneby},
  title        = {Identification of {IT} Security-Relevant System Characteristics},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {143--150},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/HallbergHS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Hamilton03,
  author       = {John A. Hamilton Jr.},
  title        = {Security Vulnerabilities in Command and Control Interoperability},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {164--169},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Hamilton03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/HoffmanRW03,
  author       = {Lance J. Hoffman and
                  Timothy Rosenberg and
                  Steve Willmore},
  title        = {The Portable Educational Network {(PEN)}},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {217--220},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/HoffmanRW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/JulianRM03,
  author       = {Donald P. Julian and
                  Neil C. Rowe and
                  James Bret Michael},
  title        = {Experiments with Deceptive Software Responses to Buffer-Based Attacks},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {43--44},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Mon, 05 Feb 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/JulianRM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/JuslinV03,
  author       = {Jukka Juslin and
                  Teemupekka Virtanen},
  title        = {Automatic Backdoor Analysis with Network Intrusion Detection System
                  and Integrated Service Checker},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {122--126},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/JuslinV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Karresand03,
  author       = {Martin Karresand},
  title        = {Separating Trojan Horses from Viruses and Worms - {A} Proposed Taxonomy
                  of Software Weapons},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {127--134},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Karresand03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/LevineLOCC03,
  author       = {John G. Levine and
                  Richard LaBella and
                  Henry L. Owen and
                  Didier Contis and
                  Brian Culver},
  title        = {The Use of Honeynets to Detect Exploited Systems Across Large Enterprise
                  Networks},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {92--99},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Thu, 27 Apr 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/LevineLOCC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/LiM03,
  author       = {Jun Li and
                  Constantine N. Manikopoulos},
  title        = {Early Statistical Anomaly Intrusion Detection of {DOS} Attacks Using
                  {MIB} Traffic Parameters},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {53--59},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/LiM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/LimSLO03,
  author       = {Yu{-}Xi Lim and
                  Tim Schmoyer and
                  John G. Levine and
                  Henry L. Owen},
  title        = {Wireless Intrusion Detection and Response},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {68--75},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Thu, 27 Apr 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/LimSLO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/LucenaCL03,
  author       = {Norka B. Lucena and
                  Steve J. Chapin and
                  Joohan Lee},
  title        = {Assuring Consistency and Increasing Reliability in Group Communication
                  Mechanisms in Computational Resiliency},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {135--143},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/LucenaCL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/McCleanSB03,
  author       = {Ingo McLean and
                  Boleslaw K. Szymanski and
                  Alan Bivens},
  title        = {Methodology of Risk Assessment in Mobile Agent System Design},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {35--42},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 16 Nov 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/McCleanSB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/McCray03,
  author       = {Joe McCray},
  title        = {A Road Map to Becoming Security Conscious},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/McCray03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/MingyuJG03,
  author       = {Fan Mingyu and
                  Wang Jinahua and
                  Wang Guangwe},
  title        = {A Design of Hardware Cryptographic Co-Processor},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {234--236},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/MingyuJG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/NguyenRK03,
  author       = {Nam T. Nguyen and
                  Peter L. Reiher and
                  Geoffrey H. Kuenning},
  title        = {Detecting Insider Threats by Monitoring System Call Activity},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {45--52},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 28 Apr 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/NguyenRK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/NingS03,
  author       = {Peng Ning and
                  Kun Sun},
  title        = {How to Misuse {AODV:} {A} Case Study of Insiider Attacks against Mobile
                  Ad-hoc Routing Protocols},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {60--67},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Thu, 02 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/NingS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/PayneR03,
  author       = {Charles N. Payne Jr. and
                  Dorene Kewley Ryder},
  title        = {On the Large-Scale Deployment of a Distributed Embedded Firewall},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {296--297},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/PayneR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/PhillipsDT03,
  author       = {Charles E. Phillips and
                  Steven A. Demurjian and
                  T. C. Ting},
  title        = {Security Assurance for an {RBAC/MAC} Security Model},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {260--267},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Wed, 13 Jun 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/PhillipsDT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/RagsdaleLD03,
  author       = {Daniel Ragsdale and
                  Scott D. Lathrop and
                  Ronald Dodge},
  title        = {A Virtual Environment for {IA} Education},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {17--23},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/RagsdaleLD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Ray03,
  author       = {Clark Ray},
  title        = {A Modest Proposal: Licencsing Personal Computers and Internet Service
                  Providers},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {151--157},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Ray03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Reynolds03,
  author       = {Charles Reynolds},
  title        = {An Undergraduate Information Assurance Curriculum},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {10--16},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Reynolds03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Reynolds03a,
  author       = {M. Sedano Reynolds},
  title        = {Next Generation DDoS web based Attacks},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {211--215},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Reynolds03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Rowe03,
  author       = {Neil C. Rowe},
  title        = {Counterplanning Deceptions To Foil Cyber-Attack Plans},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {203--210},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Rowe03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Rowe03a,
  author       = {Neil C. Rowe},
  title        = {Counterplanning Deceptions to Foil Cyber Attack-Plans},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {221--228},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Rowe03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/SinghL03,
  author       = {Prabhat K. Singh and
                  Arun Lakhotia},
  title        = {Static Verification of Worm and virus Behavior in binary Executables
                  using Model Checking},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {298--300},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/SinghL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/TorrellasSD03,
  author       = {Gustavo A. Santana Torrellas and
                  Torella Sarturo and
                  Arturo Torres Dominquez},
  title        = {Bridge Certification Authorities: Connecting {B2B} Public Key Infrastructure
                  with {PAK} and Zero-Knowledge Proof},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {182--187},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/TorrellasSD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/ValsangkarP03,
  author       = {Amit Valsangkar and
                  Brajendra Panda},
  title        = {An Architecture for Making Data Available Ceaselessly During Recovery},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {196--202},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/ValsangkarP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/WelchL03,
  author       = {Donald J. Welch and
                  Scott D. Lathrop},
  title        = {Wirless Security Threat Taxonomy},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {76--83},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/WelchL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/WilsonS03,
  author       = {Perry Wilson and
                  Bruce Shank},
  title        = {Costs and Benefits of Integrating Biometrics with a Navy Tactical
                  Weapons System},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {303--304},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/WilsonS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Wolthusen03,
  author       = {Stephen D. Wolthusen},
  title        = {A Distributed Multipurpose Mail Guard (Blinded)},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {268--275},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Wolthusen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/WuZ03,
  author       = {Ningning Wu and
                  Jing Zhang},
  title        = {Factor Analysis Based Anomaly Detection},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {108--115},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/WuZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/YangZ03,
  author       = {Cungang Yang and
                  Chang N. Zhang},
  title        = {Secure Web-based Applications with {XML} and {RBAC}},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {276--281},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/YangZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Yasenchock03,
  author       = {David A. Yasenchock},
  title        = {Army Reserve Information Operations Command Overview},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {305},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Yasenchock03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Young03,
  author       = {Adam L. Young},
  title        = {Non-Zero Sum Games and Survivable Malware},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {24--29},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Sun, 15 Jan 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Young03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/Young03a,
  author       = {Adam L. Young},
  title        = {A Weakness in Smart Card {PKI} Certification},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {30--34},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Sun, 15 Jan 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/Young03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/YuXRBZ03,
  author       = {Wei Yu and
                  Dong Xuan and
                  Sandeep K. Reddy and
                  Riccardo Bettati and
                  Wei Zhao},
  title        = {Distributed Policy Processing in Virtual Private Operation Environment
                  for Large Scale Networks},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {84--91},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Wed, 20 Apr 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/YuXRBZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/ZuoP03,
  author       = {Yanjun Zuo and
                  Brajendra Panda},
  title        = {Network Viruses: Their 306 Working Principles and Marriages with Hacking
                  Programs},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {306--307},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/ZuoP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iaw/2003,
  title        = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  publisher    = {{IEEE}},
  year         = {2003},
  isbn         = {0-7803-7808-3},
  timestamp    = {Fri, 10 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iaw/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics