Search dblp for Publications

export results for "toc:db/conf/iwia/iwia2003.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iwia/AthanasiadesALOR03,
  author       = {Nicholas Athanasiades and
                  Randal T. Abler and
                  John G. Levine and
                  Henry L. Owen and
                  George F. Riley},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Intrusion Detection Testing and Benchmarking Methodologies},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {63--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192459},
  doi          = {10.1109/IWIAS.2003.1192459},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/AthanasiadesALOR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/BerkBM03,
  author       = {Vincent Berk and
                  George Bakos and
                  Robert Morris},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Designing a Framework for Active Worm Detection on Global Networks},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {13--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192455},
  doi          = {10.1109/IWIAS.2003.1192455},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/BerkBM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/ChinchaniUK03,
  author       = {Ramkumar Chinchani and
                  Shambhu J. Upadhyaya and
                  Kevin A. Kwiat},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {A Tamper-Resistant Framework for Unambiguous Detection of Attacks
                  in User Space Using Process Monitors},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {25--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192456},
  doi          = {10.1109/IWIAS.2003.1192456},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/ChinchaniUK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/Estevez-TapiadorGD03,
  author       = {Juan M. Est{\'{e}}vez{-}Tapiador and
                  Pedro Garcia{-}Teodoro and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {3--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192454},
  doi          = {10.1109/IWIAS.2003.1192454},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/Estevez-TapiadorGD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/Gibson03,
  author       = {Tim Gibson},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {A Guard Architecture for Improved Coalition Operations},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {89--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192461},
  doi          = {10.1109/IWIAS.2003.1192461},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/Gibson03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/Hammer03,
  author       = {Volker Hammer},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {{IT} Design Critieria for Damage Reduction},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {49--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192458},
  doi          = {10.1109/IWIAS.2003.1192458},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/Hammer03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/JamesM03,
  author       = {John R. James and
                  Frank Mabry},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level
                  Issue},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {109--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192463},
  doi          = {10.1109/IWIAS.2003.1192463},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/JamesM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/LlorensVTG03,
  author       = {C{\'{e}}dric Llorens and
                  Denis Valois and
                  Yannick Le Teigner and
                  Alexandre Gibouin},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Computational Complexity of the Network Routing Logical Security Assessment
                  Process},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {37--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192457},
  doi          = {10.1109/IWIAS.2003.1192457},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/LlorensVTG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/TeoZA03,
  author       = {Lawrence Teo and
                  Yuliang Zheng and
                  Gail{-}Joon Ahn},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion
                  Detection},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {73--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192460},
  doi          = {10.1109/IWIAS.2003.1192460},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/TeoZA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/TomonoriM03,
  author       = {Fujita Tomonori and
                  Ogawara Masanori},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Protecting the Integrity of an Entire File System},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {95--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192462},
  doi          = {10.1109/IWIAS.2003.1192462},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/TomonoriM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwia/2003,
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8484/proceeding},
  isbn         = {0-7695-2019-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwia/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}