The SCEAS System
Navigation Menu

Conferences in DBLP

(discex)
2003 (conf/discex/2003)

  1. Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan
    COSSACK: Coordinated Suppression of Simultaneous Attacks. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:2-13 [Conf]
  2. Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida
    Open-Source PKI on SELinux A Technology Description. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:4-6 [Conf]
  3. Dan DaCosta, Christopher Dahn, Spiros Mancoridis, Vassilis Prevelakis
    Demonstration of COSAK static analysis tools. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:7-9 [Conf]
  4. Cynthia E. Irvine, David J. Shifflett, Paul Clark, Timothy E. Levin, George W. Dinolt
    MYSEA Technology Demonstration. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:10-12 [Conf]
  5. Robert Watson, Brian Feldman, Adam Migus, Chris Vance
    The TrustedBSD MAC Framework. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:13-0 [Conf]
  6. Roshan Thomas, Brian Mark, Tommy Johnson, James Croall
    NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:14-25 [Conf]
  7. Anita D'Amico, Stephen Salas
    Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:18-20 [Conf]
  8. Derek Armstrong, Sam Carter, Gregory Frazier, Tiffany Frazier
    A Controller-Based Autonomic Defense System. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:21-23 [Conf]
  9. Walter L. Heimerdinger
    Scyllarus Intrusion Detection Report Correlator and Analyzer. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:24-26 [Conf]
  10. W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst
    Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:26-0 [Conf]
  11. Calvin Ko
    System Health and Intrusion Monitoring: Technology Description. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:27-29 [Conf]
  12. David J. Musliner
    CIRCADIA Demonstration: Active Adaptive Defense. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:30-31 [Conf]
  13. Laura Tinnel, O. Sami Saydjari, Joshua W. Haines
    An Integrated Cyber Panel System. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:32-34 [Conf]
  14. J. Ken Williams
    Intelligence Preparation of the Information Battlespace (IPIB). [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:35-0 [Conf]
  15. Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras
    Integrated Security Services for Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:38-40 [Conf]
  16. Robert Watson, Brian Feldman, Adam Migus, Chris Vance
    Design and Implementation of the TrustedBSD MAC Framework. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:38-49 [Conf]
  17. Thomas Kostas, Diane Kiwior, Gowri Rajappan, Michel Dalal
    Key Management for Secure Multicast Group Communication in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:41-43 [Conf]
  18. Jim Irrer, Atul Prakash, Patrick McDaniel
    Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:44-46 [Conf]
  19. Sandeep Bhatt, S. Raj Rajagopalan, Prasad Rao
    Federated Security Management for Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:47-48 [Conf]
  20. Kent E. Seamons, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Aaron Patty, Bryan Smith, Tore Sundelin, Lina Yu
    TrustBuilder: Negotiating Trust in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:49-51 [Conf]
  21. Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
    Dynamic Authorization and Intrusion Response in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:50-61 [Conf]
  22. Timothy J. Smith, Gregory T. Byrd
    Yalta: A Dynamic PKI and Secure Tuplespaces for Distributed Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:52-54 [Conf]
  23. William Stephens, Brian A. Coan, Sanjai Narain, Vikram Kaul, Kirthika Parmeswaran, Thanh Cheng
    A Toolkit For Building Secure, Fault-Tolerant Virtual Private Networks Technology Description. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:55-57 [Conf]
  24. Michael T. Goodrich, Michael Shin, Christian D. Straub, Roberto Tamassia
    Distributed Data Authenication (System Demonstration). [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:58-59 [Conf]
  25. William H. Winsborough, Jay Jacobs
    Automated Trust Negotiation Technology with Attribute-based Access Control. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:60-0 [Conf]
  26. H. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott Bradner
    Design and Analysis of an IP-Layer Anonymizing Infrastructure. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:62-0 [Conf]
  27. Yair Amir, Ryan Caudy, Ashima Munjal, Theo Schlossnagle, Ciprian Tutu
    The Wackamole Approach to Fault Tolerant Networks Demo. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:64-65 [Conf]
  28. W. J. Blackert, D. M. Gregg, A. K. Castner, R. L. Hom, R. M. Jokerst, E. M. Kyle
    Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA). [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:66-67 [Conf]
  29. Hyeong-Ah Choi, Suresh Subramaniam, Hongsik Choi
    NCAC: Network Congestion Analyzer and Controller. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:68-70 [Conf]
  30. Crispin Cowan
    Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:71-72 [Conf]
  31. Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, Darrell Kindred
    DDoS Tolerant Networks. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:73-75 [Conf]
  32. Roger Knobbe, Andrew Purtell
    Guaranteed Internet Stack Utilization (GINSU) Building Blocks. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:76-77 [Conf]
  33. Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan, Scott Bradner
    ANON: An IP-Layer Anonymizing Infrastructure. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:78-80 [Conf]
  34. John C. Knight, Elisabeth A. Strunk, Kevin J. Sullivan
    Towards a Rigorous Definition of Information System Survivability. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:78-89 [Conf]
  35. Tom Markham, Lynn Meredith, Charlie Payne
    Distributed Embedded Firewalls with Virtual Private Groups. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:81-83 [Conf]
  36. Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, Naheed Vora
    Fault-Tolerant Mesh of Trust Applied to DNS Security. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:84-86 [Conf]
  37. Louise E. Moser, P. M. Melliar-Smith
    Demonstration of Fault Tolerance for CORBA Applications. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:87-89 [Conf]
  38. Todd Hughes, Mike Junod, Andy Muckelbauer
    Dynamic Trust-based Resource Allocation. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:90- [Conf]
  39. Dick O'Brien, Rick Smith, Tammy Kappel, Clint Bitzer
    Intrusion Tolerance Via Network Layer Controls. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:90-96 [Conf]
  40. Sandra Murphy, Abhijit Hayatnagarkar, Suresh Krishnaswamy, Wayne Morrison, Robert Watson
    Active Network Fault Response. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:91-93 [Conf]
  41. Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan
    COSSACK: Coordinated Suppression of Simultaneous Attacks. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:94-96 [Conf]
  42. Kihong Park
    Scalable DDoS Protection Using Route-Based Filtering. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:97-97 [Conf]
  43. Sandra Murphy, Abhijit Hayatnagarkar, Suresh Krishnaswamy, Wayne Morrison, Robert Watson
    Prophylactic, Treatment and Containment Techniques for Ensuring Active Network Security. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:97-0 [Conf]
  44. Ranga S. Ramanujan, S. Kudige, T. Nguyen
    Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA). [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:98-100 [Conf]
  45. Max Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher
    DefCOM: Defensive Cooperative Overlay Mesh. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:101-102 [Conf]
  46. Scott Rose, Kevin Bowers, Stephen Quirolgico, Kevin Mills
    Improving Failure Responsiveness in Jini Leasing. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:103-105 [Conf]
  47. W. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren, Beverly Schwartz, Robert C. Clements, Matthew Condell, Craig Partridge
    SPIE Demonstration: Single Packet Traceback. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:106-107 [Conf]
  48. Paul Syverson
    Onion Routing for Resistance to Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:108-110 [Conf]
  49. David Levin
    Lessons Learned in Using Live Red Teams in IA Experiments. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:110-119 [Conf]
  50. Roshan Thomas, Hong Zhu, Tim Huck, Tommy Johnson
    NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:111- [Conf]
  51. Joseph D. Touch, Lars Eggert, Yu-Shun Wang
    TetherNet Anti-NAT - Secure Internet Subnet Rental System. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:112-0 [Conf]
  52. Robert Balzer
    Safe Email, Safe Office, and Safe Web Browser. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:116- [Conf]
  53. Lujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel
    Access Control on the Web Using Proof-carrying Authorization. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:117-119 [Conf]
  54. Crispin Cowan, Seth Arnold, Steve Beattie, Chris Wright, John Viega
    Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:120-129 [Conf]
  55. Mark Feldman
    Enterprise Wrappers for Information Assurance. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:120-122 [Conf]
  56. John C. Knight, Jonathan Hill, Philip E. Varner, Premkumar T. Devanbu, Alexander L. Wolf, Dennis Heimbigner
    Willow System Demonstration. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:123-125 [Conf]
  57. William Weinstein, Janet Lepanto
    Camouflage of Network Traffic to Resist Attack (CONTRA). [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:126-127 [Conf]
  58. Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe
    Dependable Intrusion Tolerance: Technology Demo. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:128-130 [Conf]
  59. Seth Robertson, Eric V. Siegel, Matthew Miller, Salvatore J. Stolfo
    Surveillance Detection in High Bandwidth Environments. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:130-0 [Conf]
  60. Peng Liu
    ITDB: An Attack Self-Healing Database System Prototype. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:131-133 [Conf]
  61. D. O'Brien
    Intrusion Tolerant Web Servers via Network Layer Controls. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:134- [Conf]
  62. P. Pal
    Demonstrating Intrusion Tolerance With ITUA. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:135-137 [Conf]
  63. Ranga S. Ramanujan, Maher Kaddoura, J. Wu, C. Sanders, K. Millikin
    VPNshield: Protecing VPN Services from Denial-of-Service (DoS) Attacks. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:138-139 [Conf]
  64. Alfonso Valdes
    Detecting Novel Scans Through Pattern Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:140-151 [Conf]
  65. J. Reynolds
    On-Line Attack Prevention and Continual Recovery. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:140-142 [Conf]
  66. Viren Shah, Frank Hill
    An Aspect-Oriented Security Framework. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:143-145 [Conf]
  67. J. Shukla
    OmniVPN. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:146- [Conf]
  68. Matthew Stillerman, Dexter Kozen
    Efficient Code Certification for Open Firmware. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:147-148 [Conf]
  69. Gregg Tally, Brent Whitmore, David Sames, Brian Matt, Brian Niebuhr, David E. Bakken
    Intrusion Tolerant Distributed Object Systems: Project Summary. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:149-151 [Conf]
  70. Christoph C. Michael
    Finding the Vocabulary of Program Behavior Data for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:152-163 [Conf]
  71. Tom Van Vleck, Andrew Reisse
    SPMA - Java Binary Enhancement Tool. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:152- [Conf]
  72. Feiyi Wang, Raghu Upppalli
    SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services-A Technology Summary. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:153-0 [Conf]
  73. M. Miller
    System Detection's Hawkeye Platform. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:158-0 [Conf]
  74. Myla Archer, Elizabeth I. Leonard, Matteo Pradella
    Modeling Security-Enhanced Linux Policy Specifications for Analysis. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:164-169 [Conf]
  75. Steven J. Templeton, Karl E. Levitt
    Detecting Spoofed Packets. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:164-0 [Conf]
  76. Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida
    Open-Source PKI on SELinux. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:170-175 [Conf]
  77. Cynthia E. Irvine, David J. Shifflett, Paul Clark, Timothy E. Levin, George W. Dinolt
    Monterey Security Enhanced Architecture Project. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:176-181 [Conf]
  78. Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith
    The STRONGMAN Architecture. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:178-188 [Conf]
  79. Peter G. Neumann
    Achieving Principled Assuredly Trustworthy Composable Systems and Networks. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:182-187 [Conf]
  80. Hans T. Reiser
    Enhancing ReiserFS Security In Linux. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:188-0 [Conf]
  81. Timothy J. Smith, Gregory T. Byrd, Xiaoyong Wu, Hongjie Xin, Krithiga Thangavelu, Rong Wang, Arpan Shah
    Dynamic PKI and Secure Tuplespaces for Distributed Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:189-200 [Conf]
  82. Anita D'Amico, Stephen Salas
    Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:190-195 [Conf]
  83. Joshua W. Haines, Stephen A. Goulet, Robert S. Durst, Terrance G. Champion
    LLSIM: Network Simulation for Correlation and Response Testing. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:196-201 [Conf]
  84. Ninghui Li, John C. Mitchell
    A Role-based Trust-management Framework. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:201-0 [Conf]
  85. Calvin Ko, Karl N. Levitt
    System Health and Intrusion Monitoring (SHIM): Project Summary. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:202-207 [Conf]
  86. John J. Shaw
    Predicting the Impact of Cyber-Attacks on BMC3 Enterprises. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:208-0 [Conf]
  87. Xiaoliang Zhao, Daniel Massey, Shyhtsun Felix Wu, Mohit Lad, Dan Pei, Lan Wang, Lixia Zhang
    Understanding BGP Behavior through a Study of DoD Prefixes. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:214-225 [Conf]
  88. Vijay G. Bharadwaj, John S. Baras
    A Framework for Automated Negotiation of Access Control Policies. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:216-221 [Conf]
  89. Weifeng Chen, Lakshminath R. Dondeti
    Recommendations in Using Group Key Management Algorithms. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:222-227 [Conf]
  90. Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik
    Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:226-237 [Conf]
  91. Jeffrey Kay, Steve Crocker
    DyCER: A Lightweight Data Sharing System Using Replication. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:228-233 [Conf]
  92. Patrick McDaniel, Atul Prakash
    A Flexible Architecture for Security Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:234-239 [Conf]
  93. Jonathan K. Millen, Grit Denker
    MuCAPSL. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:238-0 [Conf]
  94. Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu
    Trust Negotiation in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:240-245 [Conf]
  95. Michael T. Goodrich, Roberto Tamassia
    Efficient and Scalable Infrastructure Support for Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:246-251 [Conf]
  96. William H. Winsborough, Jay Jacobs
    Automated Trust Negotiation in Attribute-based Access Control. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:252-0 [Conf]
  97. Sava Stanic, Suresh Subramaniam, Hongsik Choi, Gokhan Sahin, Hyeong-Ah Choi
    Efficient Alarm Management in Optical Networks. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:252-260 [Conf]
  98. Lynn M. Meredith
    A Summary of the Autonomic Distributed Firewalls (ADF) Project. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:260-265 [Conf]
  99. Sudarshan Vasudevan, Brian DeCleene, Neil Immerman, James F. Kurose, Donald F. Towsley
    Leader Election Algorithms for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:261-272 [Conf]
  100. W. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren, Beverly Schwartz, Robert C. Clements, Matthew Condell, Craig Partridge
    Traceback of Single IP Packets Using SPIE. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:266-270 [Conf]
  101. Joseph D. Touch, Gregory G. Finn, Yu-Shun Wang, Lars Eggert
    DynaBone: Dynamic Defense Using Multi-layer Internet Overlays. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:271-276 [Conf]
  102. Rui Jiang, Vikram Gupta, Chinya V. Ravishankar
    Interactions Between TCP and the IEEE 802.11 MAC Protocol. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:273-0 [Conf]
  103. Xiaoyong Wu, Vinay A. Mahadik, Douglas S. Reeves
    A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:277-0 [Conf]
  104. Peng Liu
    Engineering a Distributed Intrusion Tolerant Database System Using COTS Components. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:284-289 [Conf]
  105. Steven Cheung, Ulf Lindqvist, Martin W. Fong
    Modeling Multistep Cyber Attacks for Scenario Recognition. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:284-292 [Conf]
  106. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern
    EMT/MET: Systems for Modeling and Detecting Errant Email. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:290-0 [Conf]
  107. D. Nojiri, Jeff Rowe, Karl N. Levitt
    Cooperative Response Strategies for Large Scale Attack Mitigation. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:293-302 [Conf]
  108. Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, Darrell Kindred
    Statistical Approaches to DDoS Attack Detection and Response. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:303-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002