The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
2003 (conf/acsac/2003)

  1. Clark Weissman
    MLS-PCA: A High Assurance Security Architecture for Future Avionics. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:2-13 [Conf]
  2. Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
    Bayesian Event Classification for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:14-23 [Conf]
  3. Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer
    Intrusion Detection: A Bioinformatics Approach. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:24-33 [Conf]
  4. Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer
    A Stateful Intrusion Detection System for World-Wide Web Servers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:34-45 [Conf]
  5. James P. Early, Carla E. Brodley, Catherine Rosenberg
    Behavioral Authentication of Server Flows. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:46-55 [Conf]
  6. Holger Peine, Reinhard Schwarz
    A Multi-View Tool for Checking the Security Semantics of Router Configurations. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:56-65 [Conf]
  7. Danilo Bruschi, A. Ornaghi, Emilia Rosti
    S-ARP: a Secure Address Resolution Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:66-75 [Conf]
  8. Matthew M. Williamson
    Design, Implementation and Test of an Email Virus Throttle. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:76-85 [Conf]
  9. Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs
    Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:86-95 [Conf]
  10. Zhaole Chen, Moon-Chuen Lee
    An IP Traceback Technique against Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:96-105 [Conf]
  11. David Carman, Daniel Coffin, Bruno Dutertre, Vipin Swarup, Ronald J. Watro
    Forum Session: Security for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:106-109 [Conf]
  12. Xunhua Wang, Mohammad Hossain Heydari, Hua Lin
    An Intrusion-Tolerant Password Authentication System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:110-118 [Conf]
  13. Shinyoung Lim, Sangseung Kang, Joochan Sohn
    Modeling of Multiple Agent based Cryptographic Key Recovery Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:119-128 [Conf]
  14. John Viega
    Practical Random Number Generation in Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:129-141 [Conf]
  15. Meng Yu, Peng Liu, Wanyu Zang
    Multi-Version Attack Recovery for Workflow System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:142-151 [Conf]
  16. Kulesh Shanmugasundaram, Nasir D. Memon
    Automatic Reassembly of Document Fragments via Context Based Statistical Models. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:152-159 [Conf]
  17. Tye Stallard, Karl N. Levitt
    Automated Analysis for Digital Forensic Science: Semantic Integrity Checking. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:160-169 [Conf]
  18. Lance Spitzner
    Honeypots: Catching the Insider Threat. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:170-181 [Conf]
  19. Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
    Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:182-191 [Conf]
  20. Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
    How to unwittingly sign non-repudiable documents with Java applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:192-196 [Conf]
  21. Hailin Wu, Andrew Burt, Ramki Thurimella
    Making Secure TCP Connections Resistant to Server Failures. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:197-207 [Conf]
  22. Peter G. Neumann, Richard J. Feiertag
    PSOS Revisited. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:208-216 [Conf]
  23. Eugene H. Spafford
    A Failure to Learn from the Past. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:217-233 [Conf]
  24. Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi
    Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:234-244 [Conf]
  25. Nathan Carey, George M. Mohay, Andrew Clark
    Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:245-254 [Conf]
  26. Cristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe
    Log Correlation for Intrusion Detection: A Proof of Concept. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:255-265 [Conf]
  27. Giovanni Iachello
    Protecting Personal Data: Can IT Security Management Standards Help? [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:266-275 [Conf]
  28. Raj Mohan, Timothy E. Levin, Cynthia E. Irvine
    An Editor for Adaptive XML-Based Policy Management of IPsec. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:276-285 [Conf]
  29. Jeff Jianxin Yan
    Security Design in Online Games. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:286-297 [Conf]
  30. Thomas Groß
    Security Analysis of the SAML Single Sign-on Browser/Artifact Profile. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:298-307 [Conf]
  31. Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson
    Scalable and Efficient PKI for Inter-Organizational Communication. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:308-318 [Conf]
  32. Ramaswamy Chandramouli
    A Policy Validation Framework for Enterprise Authorization Specification. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:319-329 [Conf]
  33. O. Sami Saydjari, Carla Marceau
    Themes and Highlights of the New Security Paradigms Workshop 2003. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:330-333 [Conf]
  34. Stephen D. Wolthusen
    Goalkeeper: Close-In Interface Protection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:334-341 [Conf]
  35. Eric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost
    Poly2 Paradigm: A Secure Network Service Architecture. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:342-351 [Conf]
  36. Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean Sha
    Defending Embedded Systems Against Buffer Overflow via Hardware/Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:352-363 [Conf]
  37. Jacob Zimmermann, Ludovic Mé, Christophe Bidan
    Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:364-373 [Conf]
  38. Darren Mutz, Giovanni Vigna, Richard A. Kemmerer
    An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:374-383 [Conf]
  39. Emilie Lundin Barse, Håkan Kvarnström, Erland Jonsson
    Synthesizing Test Data for Fraud Detection Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:384-395 [Conf]
  40. Patrick Widener, Karsten Schwan, Fabián E. Bustamante
    Differential Data Protection for Dynamic Distributed Application. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:396-405 [Conf]
  41. Dirk Balfanz
    Usable Access Control for the World Wide Web. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:406-415 [Conf]
  42. Frédéric Cuppens, Alexandre Miège
    Modelling Contexts in the Or-BAC Model. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:416-427 [Conf]
  43. Michael Clifford, Daniel Faigin, Matt Bishop, Tasneem Brutch
    Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:428-429 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002