share record
persistent URL:
Charles N. Payne Jr. , Dorene Kewley Ryder : On the Large-Scale Deployment of a Distributed Embedded Firewall. IAW 2003 : 296-297 share record
persistent URL:
Charles E. Phillips , Steven A. Demurjian , T. C. Ting : Security Assurance for an RBAC/MAC Security Model. IAW 2003 : 260-267 share record
persistent URL:
Daniel Ragsdale , Scott D. Lathrop , Ronald Dodge : A Virtual Environment for IA Education. IAW 2003 : 17-23 share record
persistent URL:
Clark Ray : A Modest Proposal: Licencsing Personal Computers and Internet Service Providers. IAW 2003 : 151-157 share record
persistent URL:
Charles Reynolds : An Undergraduate Information Assurance Curriculum. IAW 2003 : 10-16 share record
persistent URL:
M. Sedano Reynolds : Next Generation DDoS web based Attacks. IAW 2003 : 211-215 share record
persistent URL:
Neil C. Rowe : Counterplanning Deceptions To Foil Cyber-Attack Plans. IAW 2003 : 203-210 share record
persistent URL:
Neil C. Rowe : Counterplanning Deceptions to Foil Cyber Attack-Plans. IAW 2003 : 221-228 share record
persistent URL:
Prabhat K. Singh , Arun Lakhotia : Static Verification of Worm and virus Behavior in binary Executables using Model Checking. IAW 2003 : 298-300 share record
persistent URL:
Gustavo A. Santana Torrellas , Torella Sarturo , Arturo Torres Dominquez : Bridge Certification Authorities: Connecting B2B Public Key Infrastructure with PAK and Zero-Knowledge Proof. IAW 2003 : 182-187 share record
persistent URL:
Amit Valsangkar , Brajendra Panda : An Architecture for Making Data Available Ceaselessly During Recovery. IAW 2003 : 196-202 share record
persistent URL:
Donald J. Welch , Scott D. Lathrop : Wirless Security Threat Taxonomy. IAW 2003 : 76-83 share record
persistent URL:
Perry Wilson , Bruce Shank : Costs and Benefits of Integrating Biometrics with a Navy Tactical Weapons System. IAW 2003 : 303-304 share record
persistent URL:
Stephen D. Wolthusen : A Distributed Multipurpose Mail Guard (Blinded). IAW 2003 : 268-275 share record
persistent URL:
Ningning Wu , Jing Zhang : Factor Analysis Based Anomaly Detection. IAW 2003 : 108-115 share record
persistent URL:
Cungang Yang , Chang N. Zhang : Secure Web-based Applications with XML and RBAC. IAW 2003 : 276-281 share record
persistent URL:
David A. Yasenchock : Army Reserve Information Operations Command Overview. IAW 2003 : 305 share record
persistent URL:
Adam L. Young : Non-Zero Sum Games and Survivable Malware. IAW 2003 : 24-29 share record
persistent URL:
Adam L. Young : A Weakness in Smart Card PKI Certification. IAW 2003 : 30-34 share record
persistent URL:
Wei Yu , Dong Xuan , Sandeep K. Reddy , Riccardo Bettati , Wei Zhao : Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. IAW 2003 : 84-91 share record
persistent URL:
Yanjun Zuo , Brajendra Panda : Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. IAW 2003 : 306-307 share record
persistent URL:
IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA. IEEE 2003 , ISBN 0-7803-7808-3 [contents]