


default search action
IAW 2003: West Point, New York, USA
- IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA. IEEE 2003, ISBN 0-7803-7808-3

Information Assurance Education
- Joe McCray:

A Road Map to Becoming Security Conscious. IAW 2003: 1-9 - Charles Reynolds:

An Undergraduate Information Assurance Curriculum. IAW 2003: 10-16 - Daniel Ragsdale, Scott D. Lathrop, Ronald Dodge:

A Virtual Environment for IA Education. IAW 2003: 17-23
Viruses and Mobile Agents
- Adam L. Young:

Non-Zero Sum Games and Survivable Malware. IAW 2003: 24-29 - Adam L. Young:

A Weakness in Smart Card PKI Certification. IAW 2003: 30-34 - Ingo McLean, Boleslaw K. Szymanski, Alan Bivens:

Methodology of Risk Assessment in Mobile Agent System Design. IAW 2003: 35-42
Intrusion Detection I
- Donald P. Julian, Neil C. Rowe, James Bret Michael:

Experiments with Deceptive Software Responses to Buffer-Based Attacks. IAW 2003: 43-44 - Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning:

Detecting Insider Threats by Monitoring System Call Activity. IAW 2003: 45-52 - Jun Li, Constantine N. Manikopoulos:

Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. IAW 2003: 53-59
Wireless Security & Ad Hoc Networks
- Peng Ning, Kun Sun:

How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. IAW 2003: 60-67 - Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen:

Wireless Intrusion Detection and Response. IAW 2003: 68-75 - Donald J. Welch, Scott D. Lathrop:

Wirless Security Threat Taxonomy. IAW 2003: 76-83
Policy and Defensive Measures
- Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao:

Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. IAW 2003: 84-91 - John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver:

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. IAW 2003: 92-99 - Thomas P. Cahill, Konstantin Rozinov, Christopher Mulé:

Cyber Warfare Peacekeeping. IAW 2003: 100-107
Intrusion Detection
- Ningning Wu, Jing Zhang:

Factor Analysis Based Anomaly Detection. IAW 2003: 108-115 - James Butler, Jeffrey Undercoffer, John Pinkston:

Hidden Processes: The Implication for Intrusion Detection. IAW 2003: 116-121 - Jukka Juslin, Teemupekka Virtanen:

Automatic Backdoor Analysis with Network Intrusion Detection System and Integrated Service Checker. IAW 2003: 122-126
Theory
- Martin Karresand:

Separating Trojan Horses from Viruses and Worms - A Proposed Taxonomy of Software Weapons. IAW 2003: 127-134 - Norka B. Lucena, Steve J. Chapin, Joohan Lee:

Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency. IAW 2003: 135-143 - Jonas Hallberg, Amund Hunstad, Anna Stjerneby:

Identification of IT Security-Relevant System Characteristics. IAW 2003: 143-150
Pre-Planned Security
- Clark Ray:

A Modest Proposal: Licencsing Personal Computers and Internet Service Providers. IAW 2003: 151-157 - Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya:

Insecure Programming: How Culpable is a Language's Syntax? IAW 2003: 158-163 - John A. Hamilton Jr.:

Security Vulnerabilities in Command and Control Interoperability. IAW 2003: 164-169
Authentication and Access Control
- S. K. Dahel, Q. Xiao Dominquez:

Accuracy Performance Analysis of Multimodal Biometrics. IAW 2003: 170-173 - Manish Gupta, Shamik Banerjee, H. Raghav Rao, Shambhu J. Upadhyaya:

Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security. IAW 2003: 174-181 - Gustavo A. Santana Torrellas, Torella Sarturo, Arturo Torres Dominquez:

Bridge Certification Authorities: Connecting B2B Public Key Infrastructure with PAK and Zero-Knowledge Proof. IAW 2003: 182-187
Intrusion Response and Recovery
- Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:

On Countermeasures to Traffic Analysis Attacks. IAW 2003: 188-195 - Amit Valsangkar, Brajendra Panda:

An Architecture for Making Data Available Ceaselessly During Recovery. IAW 2003: 196-202 - Neil C. Rowe:

Counterplanning Deceptions To Foil Cyber-Attack Plans. IAW 2003: 203-210
Advanced Topics I
- M. Sedano Reynolds:

Next Generation DDoS web based Attacks. IAW 2003: 211-215 - Lance J. Hoffman, Timothy Rosenberg, Steve Willmore:

The Portable Educational Network (PEN). IAW 2003: 217-220
Risk Analysis
- Neil C. Rowe:

Counterplanning Deceptions to Foil Cyber Attack-Plans. IAW 2003: 221-228 - Yong Chen, Christian Damsgaard Jensen, Jean-Marc Seigneur, Elizabeth Gray:

Risk Probability Estimating Based on Clustering. IAW 2003: 229-233
Cryptography
- Fan Mingyu, Wang Jinahua, Wang Guangwe:

A Design of Hardware Cryptographic Co-Processor. IAW 2003: 234-236 - David A. Barlow, Vasos Vassiliou, Henry L. Owen:

A Cryptographic Protocol to Protect MPLS Labels. IAW 2003: 237-242
Defensive Techniques
- Joshua W. Haines, Stephen A. Goulet, Robert S. Durst, Terrence G. Champion:

LLSIM: Network Simulation for Correlation and Response Testing. IAW 2003: 243-250 - Fabio A. González, Jonatan Gómez, Madhavi Kaniganti, Dipankar Dasgupta:

An Evolutionary Approach to Generate Fuzzy Anomaly Signatures. IAW 2003: 251-259 - Charles E. Phillips, Steven A. Demurjian, T. C. Ting:

Security Assurance for an RBAC/MAC Security Model. IAW 2003: 260-267
Advanced Topics II
- Stephen D. Wolthusen:

A Distributed Multipurpose Mail Guard (Blinded). IAW 2003: 268-275 - Cungang Yang, Chang N. Zhang:

Secure Web-based Applications with XML and RBAC. IAW 2003: 276-281 - Casimer M. DeCusatis:

Information Assurance for Enterprise Fiber Optic Networks. IAW 2003: 282-287
Poster Session
- Mario Baldi, Yoram Ofek, Moti Yung:

The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution. IAW 2003: 288-291 - Abdur Rahim Choudhary:

Security-Auditing in a Softswitch. IAW 2003: 292-293 - John L. Cole:

IEEE Information Assuurance Activities. IAW 2003: 294-295 - Charles N. Payne Jr., Dorene Kewley Ryder:

On the Large-Scale Deployment of a Distributed Embedded Firewall. IAW 2003: 296-297 - Prabhat K. Singh, Arun Lakhotia:

Static Verification of Worm and virus Behavior in binary Executables using Model Checking. IAW 2003: 298-300 - Javed A. Aslam, Sergey Bratus, David Kotz, Ronald A. Peterson, Daniela Rus, Brett Tofel:

The Kerf toolkit for intrusion analysis. IAW 2003: 301-302 - Perry Wilson, Bruce Shank:

Costs and Benefits of Integrating Biometrics with a Navy Tactical Weapons System. IAW 2003: 303-304 - David A. Yasenchock:

Army Reserve Information Operations Command Overview. IAW 2003: 305 - Yanjun Zuo, Brajendra Panda:

Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. IAW 2003: 306-307

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














