- Jim Irrer, Atul Prakash, Patrick D. McDaniel:
Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System. DISCEX (2) 2003: 44-46 - Cynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy E. Levin, George W. Dinolt:
MYSEA Technology Demonstration. DISCEX (2) 2003: 10-12 - Cynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy E. Levin, George W. Dinolt:
Monterey Security Enhanced Architecture Project. DISCEX (2) 2003: 176-181 - Rui Jiang, Vikram Gupta, Chinya V. Ravishankar:
Interactions Between TCP and the IEEE 802.11 MAC Protocol. DISCEX (1) 2003: 273- - Jeffrey Kay, Steve Crocker:
DyCER: A Lightweight Data Sharing System Using Replication. DISCEX (2) 2003: 228-233 - Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith:
The STRONGMAN Architecture. DISCEX (1) 2003: 178-188 - Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras:
Integrated Security Services for Dynamic Coalitions. DISCEX (2) 2003: 38-40 - John C. Knight, Jonathan Hill, Philip E. Varner, Premkumar T. Devanbu, Alexander L. Wolf, Dennis Heimbigner:
Willow System Demonstration. DISCEX (2) 2003: 123-125 - John C. Knight, Elisabeth A. Strunk, Kevin J. Sullivan:
Towards a Rigorous Definition of Information System Survivability. DISCEX (1) 2003: 78-89 - Roger Knobbe, Andrew Purtell:
Guaranteed Internet Stack Utilization (GINSU) Building Blocks. DISCEX (2) 2003: 76-77 - Calvin Ko:
System Health and Intrusion Monitoring: Technology Description. DISCEX (2) 2003: 27-29 - Calvin Ko, Karl N. Levitt:
System Health and Intrusion Monitoring (SHIM): Project Summary. DISCEX (2) 2003: 202-207 - Thomas Kostas, Diane Kiwior, Gowri Rajappan, Michel Dalal:
Key Management for Secure Multicast Group Communication in Mobile Networks. DISCEX (2) 2003: 41-43 - H. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott O. Bradner:
Design and Analysis of an IP-Layer Anonymizing Infrastructure. DISCEX (1) 2003: 62- - David Levin:
Lessons Learned in Using Live Red Teams in IA Experiments. DISCEX (1) 2003: 110-119 - Ninghui Li, John C. Mitchell:
A Role-based Trust-management Framework. DISCEX (1) 2003: 201- - Peng Liu:
ITDB: An Attack Self-Healing Database System Prototype. DISCEX (2) 2003: 131-133 - Peng Liu:
Engineering a Distributed Intrusion Tolerant Database System Using COTS Components. DISCEX (2) 2003: 284-289 - Tom Markham, Lynn Meredith, Charlie Payne:
Distributed Embedded Firewalls with Virtual Private Groups. DISCEX (2) 2003: 81-83 - Patrick D. McDaniel, Atul Prakash:
A Flexible Architecture for Security Policy Enforcement. DISCEX (2) 2003: 234-239 - Lynn M. Meredith:
A Summary of the Autonomic Distributed Firewalls (ADF) Project. DISCEX (2) 2003: 260-265 - Christoph C. Michael:
Finding the Vocabulary of Program Behavior Data for Anomaly Detection. DISCEX (1) 2003: 152-163 - Jonathan K. Millen, Grit Denker:
MuCAPSL. DISCEX (1) 2003: 238- - M. Miller:
System Detection's Hawkeye Platform. DISCEX (2) 2003: 158- - Louise E. Moser, P. M. Melliar-Smith:
Demonstration of Fault Tolerance for CORBA Applications. DISCEX (2) 2003: 87-89 - Sandra Murphy, Abhijit Hayatnagarkar, Suresh Krishnaswamy, Wayne Morrison, Robert Watson:
Prophylactic, Treatment and Containment Techniques for Ensuring Active Network Security. DISCEX (1) 2003: 97- - Sandra Murphy, Abhijit Hayatnagarkar, Suresh Krishnaswamy, Wayne Morrison, Robert Watson:
Active Network Fault Response. DISCEX (2) 2003: 91-93 - David J. Musliner:
CIRCADIA Demonstration: Active Adaptive Defense. DISCEX (2) 2003: 30-31 - Peter G. Neumann:
Achieving Principled Assuredly Trustworthy Composable Systems and Networks. DISCEX (2) 2003: 182-187 - D. Nojiri, Jeff Rowe, Karl N. Levitt:
Cooperative Response Strategies for Large Scale Attack Mitigation. DISCEX (1) 2003: 293-302