|
Conferences in DBLP
- Clark Weissman
MLS-PCA: A High Assurance Security Architecture for Future Avionics. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:2-13 [Conf]
- Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
Bayesian Event Classification for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:14-23 [Conf]
- Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer
Intrusion Detection: A Bioinformatics Approach. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:24-33 [Conf]
- Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer
A Stateful Intrusion Detection System for World-Wide Web Servers. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:34-45 [Conf]
- James P. Early, Carla E. Brodley, Catherine Rosenberg
Behavioral Authentication of Server Flows. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:46-55 [Conf]
- Holger Peine, Reinhard Schwarz
A Multi-View Tool for Checking the Security Semantics of Router Configurations. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:56-65 [Conf]
- Danilo Bruschi, A. Ornaghi, Emilia Rosti
S-ARP: a Secure Address Resolution Protocol. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:66-75 [Conf]
- Matthew M. Williamson
Design, Implementation and Test of an Email Virus Throttle. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:76-85 [Conf]
- Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:86-95 [Conf]
- Zhaole Chen, Moon-Chuen Lee
An IP Traceback Technique against Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:96-105 [Conf]
- David Carman, Daniel Coffin, Bruno Dutertre, Vipin Swarup, Ronald J. Watro
Forum Session: Security for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:106-109 [Conf]
- Xunhua Wang, Mohammad Hossain Heydari, Hua Lin
An Intrusion-Tolerant Password Authentication System. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:110-118 [Conf]
- Shinyoung Lim, Sangseung Kang, Joochan Sohn
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:119-128 [Conf]
- John Viega
Practical Random Number Generation in Software. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:129-141 [Conf]
- Meng Yu, Peng Liu, Wanyu Zang
Multi-Version Attack Recovery for Workflow System. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:142-151 [Conf]
- Kulesh Shanmugasundaram, Nasir D. Memon
Automatic Reassembly of Document Fragments via Context Based Statistical Models. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:152-159 [Conf]
- Tye Stallard, Karl N. Levitt
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:160-169 [Conf]
- Lance Spitzner
Honeypots: Catching the Insider Threat. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:170-181 [Conf]
- Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:182-191 [Conf]
- Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
How to unwittingly sign non-repudiable documents with Java applications. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:192-196 [Conf]
- Hailin Wu, Andrew Burt, Ramki Thurimella
Making Secure TCP Connections Resistant to Server Failures. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:197-207 [Conf]
- Peter G. Neumann, Richard J. Feiertag
PSOS Revisited. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:208-216 [Conf]
- Eugene H. Spafford
A Failure to Learn from the Past. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:217-233 [Conf]
- Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:234-244 [Conf]
- Nathan Carey, George M. Mohay, Andrew Clark
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:245-254 [Conf]
- Cristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe
Log Correlation for Intrusion Detection: A Proof of Concept. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:255-265 [Conf]
- Giovanni Iachello
Protecting Personal Data: Can IT Security Management Standards Help? [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:266-275 [Conf]
- Raj Mohan, Timothy E. Levin, Cynthia E. Irvine
An Editor for Adaptive XML-Based Policy Management of IPsec. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:276-285 [Conf]
- Jeff Jianxin Yan
Security Design in Online Games. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:286-297 [Conf]
- Thomas Groß
Security Analysis of the SAML Single Sign-on Browser/Artifact Profile. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:298-307 [Conf]
- Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson
Scalable and Efficient PKI for Inter-Organizational Communication. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:308-318 [Conf]
- Ramaswamy Chandramouli
A Policy Validation Framework for Enterprise Authorization Specification. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:319-329 [Conf]
- O. Sami Saydjari, Carla Marceau
Themes and Highlights of the New Security Paradigms Workshop 2003. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:330-333 [Conf]
- Stephen D. Wolthusen
Goalkeeper: Close-In Interface Protection. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:334-341 [Conf]
- Eric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost
Poly2 Paradigm: A Secure Network Service Architecture. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:342-351 [Conf]
- Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean Sha
Defending Embedded Systems Against Buffer Overflow via Hardware/Software. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:352-363 [Conf]
- Jacob Zimmermann, Ludovic Mé, Christophe Bidan
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:364-373 [Conf]
- Darren Mutz, Giovanni Vigna, Richard A. Kemmerer
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:374-383 [Conf]
- Emilie Lundin Barse, Håkan Kvarnström, Erland Jonsson
Synthesizing Test Data for Fraud Detection Systems. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:384-395 [Conf]
- Patrick Widener, Karsten Schwan, Fabián E. Bustamante
Differential Data Protection for Dynamic Distributed Application. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:396-405 [Conf]
- Dirk Balfanz
Usable Access Control for the World Wide Web. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:406-415 [Conf]
- Frédéric Cuppens, Alexandre Miège
Modelling Contexts in the Or-BAC Model. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:416-427 [Conf]
- Michael Clifford, Daniel Faigin, Matt Bishop, Tasneem Brutch
Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:428-429 [Conf]
|