Conferences in DBLP
(discex) 2003 (conf/discex/2003)
Christos Papadopoulos , Robert Lindell , John Mehringer , Alefiya Hussain , Ramesh Govindan COSSACK: Coordinated Suppression of Simultaneous Attacks. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:2-13 [Conf ] Edward Bubnis , Shelby Evans , Peter Fischer , Elizabeth Meighan , Aswin Almeida Open-Source PKI on SELinux A Technology Description. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:4-6 [Conf ] Dan DaCosta , Christopher Dahn , Spiros Mancoridis , Vassilis Prevelakis Demonstration of COSAK static analysis tools. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:7-9 [Conf ] Cynthia E. Irvine , David J. Shifflett , Paul Clark , Timothy E. Levin , George W. Dinolt MYSEA Technology Demonstration. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:10-12 [Conf ] Robert Watson , Brian Feldman , Adam Migus , Chris Vance The TrustedBSD MAC Framework. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:13-0 [Conf ] Roshan Thomas , Brian Mark , Tommy Johnson , James Croall NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:14-25 [Conf ] Anita D'Amico , Stephen Salas Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:18-20 [Conf ] Derek Armstrong , Sam Carter , Gregory Frazier , Tiffany Frazier A Controller-Based Autonomic Defense System. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:21-23 [Conf ] Walter L. Heimerdinger Scyllarus Intrusion Detection Report Correlator and Analyzer. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:24-26 [Conf ] W. J. Blackert , D. M. Gregg , A. K. Castner , E. M. Kyle , R. L. Hom , R. M. Jokerst Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:26-0 [Conf ] Calvin Ko System Health and Intrusion Monitoring: Technology Description. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:27-29 [Conf ] David J. Musliner CIRCADIA Demonstration: Active Adaptive Defense. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:30-31 [Conf ] Laura Tinnel , O. Sami Saydjari , Joshua W. Haines An Integrated Cyber Panel System. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:32-34 [Conf ] J. Ken Williams Intelligence Preparation of the Information Battlespace (IPIB). [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:35-0 [Conf ] Himanshu Khurana , Serban I. Gavrila , Rakeshbabu Bobba , Radostina K. Koleva , Anuja Sonalker , Emilian Dinu , Virgil D. Gligor , John S. Baras Integrated Security Services for Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:38-40 [Conf ] Robert Watson , Brian Feldman , Adam Migus , Chris Vance Design and Implementation of the TrustedBSD MAC Framework. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:38-49 [Conf ] Thomas Kostas , Diane Kiwior , Gowri Rajappan , Michel Dalal Key Management for Secure Multicast Group Communication in Mobile Networks. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:41-43 [Conf ] Jim Irrer , Atul Prakash , Patrick McDaniel Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:44-46 [Conf ] Sandeep Bhatt , S. Raj Rajagopalan , Prasad Rao Federated Security Management for Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:47-48 [Conf ] Kent E. Seamons , Thomas Chan , Evan Child , Michael Halcrow , Adam Hess , Jason E. Holt , Jared Jacobson , Ryan Jarvis , Aaron Patty , Bryan Smith , Tore Sundelin , Lina Yu TrustBuilder: Negotiating Trust in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:49-51 [Conf ] Tatyana Ryutov , B. Clifford Neuman , Dong-Ho Kim Dynamic Authorization and Intrusion Response in Distributed Systems. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:50-61 [Conf ] Timothy J. Smith , Gregory T. Byrd Yalta: A Dynamic PKI and Secure Tuplespaces for Distributed Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:52-54 [Conf ] William Stephens , Brian A. Coan , Sanjai Narain , Vikram Kaul , Kirthika Parmeswaran , Thanh Cheng A Toolkit For Building Secure, Fault-Tolerant Virtual Private Networks Technology Description. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:55-57 [Conf ] Michael T. Goodrich , Michael Shin , Christian D. Straub , Roberto Tamassia Distributed Data Authenication (System Demonstration). [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:58-59 [Conf ] William H. Winsborough , Jay Jacobs Automated Trust Negotiation Technology with Attribute-based Access Control. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:60-0 [Conf ] H. T. Kung , Chen-Mou Cheng , Koan-Sin Tan , Scott Bradner Design and Analysis of an IP-Layer Anonymizing Infrastructure. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:62-0 [Conf ] Yair Amir , Ryan Caudy , Ashima Munjal , Theo Schlossnagle , Ciprian Tutu The Wackamole Approach to Fault Tolerant Networks Demo. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:64-65 [Conf ] W. J. Blackert , D. M. Gregg , A. K. Castner , R. L. Hom , R. M. Jokerst , E. M. Kyle Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA). [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:66-67 [Conf ] Hyeong-Ah Choi , Suresh Subramaniam , Hongsik Choi NCAC: Network Congestion Analyzer and Controller. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:68-70 [Conf ] Crispin Cowan Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:71-72 [Conf ] Laura Feinstein , Dan Schnackenberg , Ravindra Balupari , Darrell Kindred DDoS Tolerant Networks. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:73-75 [Conf ] Roger Knobbe , Andrew Purtell Guaranteed Internet Stack Utilization (GINSU) Building Blocks. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:76-77 [Conf ] Chen-Mou Cheng , H. T. Kung , Koan-Sin Tan , Scott Bradner ANON: An IP-Layer Anonymizing Infrastructure. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:78-80 [Conf ] John C. Knight , Elisabeth A. Strunk , Kevin J. Sullivan Towards a Rigorous Definition of Information System Survivability. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:78-89 [Conf ] Tom Markham , Lynn Meredith , Charlie Payne Distributed Embedded Firewalls with Virtual Private Groups. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:81-83 [Conf ] Wes Griffin , Russ Mundy , Sam Weiler , Dan Massey , Naheed Vora Fault-Tolerant Mesh of Trust Applied to DNS Security. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:84-86 [Conf ] Louise E. Moser , P. M. Melliar-Smith Demonstration of Fault Tolerance for CORBA Applications. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:87-89 [Conf ] Todd Hughes , Mike Junod , Andy Muckelbauer Dynamic Trust-based Resource Allocation. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:90- [Conf ] Dick O'Brien , Rick Smith , Tammy Kappel , Clint Bitzer Intrusion Tolerance Via Network Layer Controls. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:90-96 [Conf ] Sandra Murphy , Abhijit Hayatnagarkar , Suresh Krishnaswamy , Wayne Morrison , Robert Watson Active Network Fault Response. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:91-93 [Conf ] Christos Papadopoulos , Robert Lindell , John Mehringer , Alefiya Hussain , Ramesh Govindan COSSACK: Coordinated Suppression of Simultaneous Attacks. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:94-96 [Conf ] Kihong Park Scalable DDoS Protection Using Route-Based Filtering. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:97-97 [Conf ] Sandra Murphy , Abhijit Hayatnagarkar , Suresh Krishnaswamy , Wayne Morrison , Robert Watson Prophylactic, Treatment and Containment Techniques for Ensuring Active Network Security. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:97-0 [Conf ] Ranga S. Ramanujan , S. Kudige , T. Nguyen Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA). [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:98-100 [Conf ] Max Robinson , Jelena Mirkovic , B. Scott Michel , Matthew Schnaider , Peter L. Reiher DefCOM: Defensive Cooperative Overlay Mesh. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:101-102 [Conf ] Scott Rose , Kevin Bowers , Stephen Quirolgico , Kevin Mills Improving Failure Responsiveness in Jini Leasing. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:103-105 [Conf ] W. Timothy Strayer , Christine E. Jones , Fabrice Tchakountio , Alex C. Snoeren , Beverly Schwartz , Robert C. Clements , Matthew Condell , Craig Partridge SPIE Demonstration: Single Packet Traceback. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:106-107 [Conf ] Paul Syverson Onion Routing for Resistance to Traffic Analysis. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:108-110 [Conf ] David Levin Lessons Learned in Using Live Red Teams in IA Experiments. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:110-119 [Conf ] Roshan Thomas , Hong Zhu , Tim Huck , Tommy Johnson NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:111- [Conf ] Joseph D. Touch , Lars Eggert , Yu-Shun Wang TetherNet Anti-NAT - Secure Internet Subnet Rental System. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:112-0 [Conf ] Robert Balzer Safe Email, Safe Office, and Safe Web Browser. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:116- [Conf ] Lujo Bauer , Michael A. Schneider , Edward W. Felten , Andrew W. Appel Access Control on the Web Using Proof-carrying Authorization. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:117-119 [Conf ] Crispin Cowan , Seth Arnold , Steve Beattie , Chris Wright , John Viega Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:120-129 [Conf ] Mark Feldman Enterprise Wrappers for Information Assurance. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:120-122 [Conf ] John C. Knight , Jonathan Hill , Philip E. Varner , Premkumar T. Devanbu , Alexander L. Wolf , Dennis Heimbigner Willow System Demonstration. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:123-125 [Conf ] William Weinstein , Janet Lepanto Camouflage of Network Traffic to Resist Attack (CONTRA). [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:126-127 [Conf ] Alfonso Valdes , Magnus Almgren , Steven Cheung , Yves Deswarte , Bruno Dutertre , Joshua Levy , Hassen Saïdi , Victoria Stavridou , Tomás E. Uribe Dependable Intrusion Tolerance: Technology Demo. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:128-130 [Conf ] Seth Robertson , Eric V. Siegel , Matthew Miller , Salvatore J. Stolfo Surveillance Detection in High Bandwidth Environments. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:130-0 [Conf ] Peng Liu ITDB: An Attack Self-Healing Database System Prototype. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:131-133 [Conf ] D. O'Brien Intrusion Tolerant Web Servers via Network Layer Controls. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:134- [Conf ] P. Pal Demonstrating Intrusion Tolerance With ITUA. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:135-137 [Conf ] Ranga S. Ramanujan , Maher Kaddoura , J. Wu , C. Sanders , K. Millikin VPNshield: Protecing VPN Services from Denial-of-Service (DoS) Attacks. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:138-139 [Conf ] Alfonso Valdes Detecting Novel Scans Through Pattern Anomaly Detection. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:140-151 [Conf ] J. Reynolds On-Line Attack Prevention and Continual Recovery. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:140-142 [Conf ] Viren Shah , Frank Hill An Aspect-Oriented Security Framework. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:143-145 [Conf ] J. Shukla OmniVPN. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:146- [Conf ] Matthew Stillerman , Dexter Kozen Efficient Code Certification for Open Firmware. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:147-148 [Conf ] Gregg Tally , Brent Whitmore , David Sames , Brian Matt , Brian Niebuhr , David E. Bakken Intrusion Tolerant Distributed Object Systems: Project Summary. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:149-151 [Conf ] Christoph C. Michael Finding the Vocabulary of Program Behavior Data for Anomaly Detection. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:152-163 [Conf ] Tom Van Vleck , Andrew Reisse SPMA - Java Binary Enhancement Tool. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:152- [Conf ] Feiyi Wang , Raghu Upppalli SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services-A Technology Summary. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:153-0 [Conf ] M. Miller System Detection's Hawkeye Platform. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:158-0 [Conf ] Myla Archer , Elizabeth I. Leonard , Matteo Pradella Modeling Security-Enhanced Linux Policy Specifications for Analysis. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:164-169 [Conf ] Steven J. Templeton , Karl E. Levitt Detecting Spoofed Packets. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:164-0 [Conf ] Edward Bubnis , Shelby Evans , Peter Fischer , Elizabeth Meighan , Aswin Almeida Open-Source PKI on SELinux. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:170-175 [Conf ] Cynthia E. Irvine , David J. Shifflett , Paul Clark , Timothy E. Levin , George W. Dinolt Monterey Security Enhanced Architecture Project. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:176-181 [Conf ] Angelos D. Keromytis , Sotiris Ioannidis , Michael B. Greenwald , Jonathan M. Smith The STRONGMAN Architecture. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:178-188 [Conf ] Peter G. Neumann Achieving Principled Assuredly Trustworthy Composable Systems and Networks. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:182-187 [Conf ] Hans T. Reiser Enhancing ReiserFS Security In Linux. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:188-0 [Conf ] Timothy J. Smith , Gregory T. Byrd , Xiaoyong Wu , Hongjie Xin , Krithiga Thangavelu , Rong Wang , Arpan Shah Dynamic PKI and Secure Tuplespaces for Distributed Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:189-200 [Conf ] Anita D'Amico , Stephen Salas Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:190-195 [Conf ] Joshua W. Haines , Stephen A. Goulet , Robert S. Durst , Terrance G. Champion LLSIM: Network Simulation for Correlation and Response Testing. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:196-201 [Conf ] Ninghui Li , John C. Mitchell A Role-based Trust-management Framework. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:201-0 [Conf ] Calvin Ko , Karl N. Levitt System Health and Intrusion Monitoring (SHIM): Project Summary. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:202-207 [Conf ] John J. Shaw Predicting the Impact of Cyber-Attacks on BMC3 Enterprises. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:208-0 [Conf ] Xiaoliang Zhao , Daniel Massey , Shyhtsun Felix Wu , Mohit Lad , Dan Pei , Lan Wang , Lixia Zhang Understanding BGP Behavior through a Study of DoD Prefixes. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:214-225 [Conf ] Vijay G. Bharadwaj , John S. Baras A Framework for Automated Negotiation of Access Control Policies. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:216-221 [Conf ] Weifeng Chen , Lakshminath R. Dondeti Recommendations in Using Group Key Management Algorithms. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:222-227 [Conf ] Yair Amir , Cristina Nita-Rotaru , Jonathan Robert Stanton , Gene Tsudik Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:226-237 [Conf ] Jeffrey Kay , Steve Crocker DyCER: A Lightweight Data Sharing System Using Replication. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:228-233 [Conf ] Patrick McDaniel , Atul Prakash A Flexible Architecture for Security Policy Enforcement. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:234-239 [Conf ] Jonathan K. Millen , Grit Denker MuCAPSL. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:238-0 [Conf ] Kent E. Seamons , Marianne Winslett , Ting Yu , Thomas Chan , Evan Child , Michael Halcrow , Adam Hess , Jason E. Holt , Jared Jacobson , Ryan Jarvis , Bryan Smith , Tore Sundelin , Lina Yu Trust Negotiation in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:240-245 [Conf ] Michael T. Goodrich , Roberto Tamassia Efficient and Scalable Infrastructure Support for Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:246-251 [Conf ] William H. Winsborough , Jay Jacobs Automated Trust Negotiation in Attribute-based Access Control. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:252-0 [Conf ] Sava Stanic , Suresh Subramaniam , Hongsik Choi , Gokhan Sahin , Hyeong-Ah Choi Efficient Alarm Management in Optical Networks. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:252-260 [Conf ] Lynn M. Meredith A Summary of the Autonomic Distributed Firewalls (ADF) Project. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:260-265 [Conf ] Sudarshan Vasudevan , Brian DeCleene , Neil Immerman , James F. Kurose , Donald F. Towsley Leader Election Algorithms for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:261-272 [Conf ] W. Timothy Strayer , Christine E. Jones , Fabrice Tchakountio , Alex C. Snoeren , Beverly Schwartz , Robert C. Clements , Matthew Condell , Craig Partridge Traceback of Single IP Packets Using SPIE. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:266-270 [Conf ] Joseph D. Touch , Gregory G. Finn , Yu-Shun Wang , Lars Eggert DynaBone: Dynamic Defense Using Multi-layer Internet Overlays. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:271-276 [Conf ] Rui Jiang , Vikram Gupta , Chinya V. Ravishankar Interactions Between TCP and the IEEE 802.11 MAC Protocol. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:273-0 [Conf ] Xiaoyong Wu , Vinay A. Mahadik , Douglas S. Reeves A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:277-0 [Conf ] Peng Liu Engineering a Distributed Intrusion Tolerant Database System Using COTS Components. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:284-289 [Conf ] Steven Cheung , Ulf Lindqvist , Martin W. Fong Modeling Multistep Cyber Attacks for Scenario Recognition. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:284-292 [Conf ] Salvatore J. Stolfo , Shlomo Hershkop , Ke Wang , Olivier Nimeskern EMT/MET: Systems for Modeling and Detecting Errant Email. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:290-0 [Conf ] D. Nojiri , Jeff Rowe , Karl N. Levitt Cooperative Response Strategies for Large Scale Attack Mitigation. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:293-302 [Conf ] Laura Feinstein , Dan Schnackenberg , Ravindra Balupari , Darrell Kindred Statistical Approaches to DDoS Attack Detection and Response. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:303-0 [Conf ]