default search action
4. IWIA 2006: Egham, Surrey, UK
- Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK. IEEE Computer Society 2006, ISBN 0-7695-2564-4
Intrusion Detection and Prevention I
- Simon P. Chung, Aloysius K. Mok:
The LAIDS/LIDS Framework for Systematic IPS Design. 3-11 - Emmanuel Hooper:
An Intelligent Detection and Response Strategy to False Positives and Network Attacks. 12-31 - Bing Chen, Joohan Lee, Annie S. Wu:
Active Event Correlation in Bro IDS to Detect Multi-stage Attacks. 32-50
Evaluation and Criteria
- Allan Pedersen, Anders Hedegaard, Robin Sharp:
Designing a Secure Point-of-Sale System. 51-65 - Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine:
High Robustness Requirements in a Common Criteria Protection Profile. 66-78
Modeling and Engineering Software Security
- Qingfeng He, Paul N. Otto, Annie I. Antón, Laurie A. Jones:
Ensuring Compliance between Policies, Requirements and Software Design: A Case Study. 79-92 - Suleyman Kondakci:
A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk Management. 93-102
Defending Communication Systems
- Nils Aschenbruck, Matthias Frank, Peter Martini, Jens Tölle, Roland Legat, Heinz-Dieter Richmann:
Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks. 103-108 - Hank Rausch:
Jamming Commercial Satellite Communications During Wartime: An Empirical Study. 109-118
Intrusion Detection and Prevention II
- E. Earl Eiland, Lorie M. Liebrock:
An Application of Information Theory to Intrusion Detection. 119-134 - Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang:
HonIDS: Enhancing Honeypot System with Intrusion Detection Models. 135-143 - Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon:
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. 144-156
Modeling Security
- Ole Martin Dahl, Stephen D. Wolthusen:
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets. 157-168 - Kevin Kahley, Manigandan Radhakrishnan, Jon A. Solworth:
Factoring High Level Information Flow Specifications into Low Level Access Controls. 169-186
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.