default search action
Search dblp for Publications
export results for "toc:db/conf/iwia/iwia2003.bht:"
@inproceedings{DBLP:conf/iwia/AthanasiadesALOR03, author = {Nicholas Athanasiades and Randal T. Abler and John G. Levine and Henry L. Owen and George F. Riley}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Intrusion Detection Testing and Benchmarking Methodologies}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {63--72}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192459}, doi = {10.1109/IWIAS.2003.1192459}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/AthanasiadesALOR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/BerkBM03, author = {Vincent Berk and George Bakos and Robert Morris}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Designing a Framework for Active Worm Detection on Global Networks}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {13--24}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192455}, doi = {10.1109/IWIAS.2003.1192455}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/BerkBM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/ChinchaniUK03, author = {Ramkumar Chinchani and Shambhu J. Upadhyaya and Kevin A. Kwiat}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {25--36}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192456}, doi = {10.1109/IWIAS.2003.1192456}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/ChinchaniUK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/Estevez-TapiadorGD03, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Pedro Garcia{-}Teodoro and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {3--12}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192454}, doi = {10.1109/IWIAS.2003.1192454}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/Estevez-TapiadorGD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/Gibson03, author = {Tim Gibson}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {A Guard Architecture for Improved Coalition Operations}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {89--94}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192461}, doi = {10.1109/IWIAS.2003.1192461}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/Gibson03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/Hammer03, author = {Volker Hammer}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {{IT} Design Critieria for Damage Reduction}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {49--62}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192458}, doi = {10.1109/IWIAS.2003.1192458}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/Hammer03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/JamesM03, author = {John R. James and Frank Mabry}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level Issue}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {109--112}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192463}, doi = {10.1109/IWIAS.2003.1192463}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/JamesM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/LlorensVTG03, author = {C{\'{e}}dric Llorens and Denis Valois and Yannick Le Teigner and Alexandre Gibouin}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Computational Complexity of the Network Routing Logical Security Assessment Process}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {37--48}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192457}, doi = {10.1109/IWIAS.2003.1192457}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/LlorensVTG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/TeoZA03, author = {Lawrence Teo and Yuliang Zheng and Gail{-}Joon Ahn}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {73--88}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192460}, doi = {10.1109/IWIAS.2003.1192460}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/TeoZA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/TomonoriM03, author = {Fujita Tomonori and Ogawara Masanori}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Protecting the Integrity of an Entire File System}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {95--108}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192462}, doi = {10.1109/IWIAS.2003.1192462}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/TomonoriM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwia/2003, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://ieeexplore.ieee.org/xpl/conhome/8484/proceeding}, isbn = {0-7695-2019-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwia/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.