


default search action
4. IWIA 2006: Egham, Surrey, UK
- Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK. IEEE Computer Society 2006, ISBN 0-7695-2564-4

Intrusion Detection and Prevention I
- Simon P. Chung, Aloysius K. Mok:

The LAIDS/LIDS Framework for Systematic IPS Design. 3-11 - Emmanuel Hooper:

An Intelligent Detection and Response Strategy to False Positives and Network Attacks. 12-31 - Bing Chen, Joohan Lee, Annie S. Wu:

Active Event Correlation in Bro IDS to Detect Multi-stage Attacks. 32-50
Evaluation and Criteria
- Allan Pedersen, Anders Hedegaard, Robin Sharp:

Designing a Secure Point-of-Sale System. 51-65 - Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine:

High Robustness Requirements in a Common Criteria Protection Profile. 66-78
Modeling and Engineering Software Security
- Qingfeng He, Paul N. Otto, Annie I. Antón, Laurie A. Jones:

Ensuring Compliance between Policies, Requirements and Software Design: A Case Study. 79-92 - Suleyman Kondakci

:
A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk Management. 93-102
Defending Communication Systems
- Nils Aschenbruck, Matthias Frank, Peter Martini, Jens Tölle, Roland Legat, Heinz-Dieter Richmann:

Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks. 103-108 - Hank Rausch:

Jamming Commercial Satellite Communications During Wartime: An Empirical Study. 109-118
Intrusion Detection and Prevention II
- E. Earl Eiland, Lorie M. Liebrock:

An Application of Information Theory to Intrusion Detection. 119-134 - Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang:

HonIDS: Enhancing Honeypot System with Intrusion Detection Models. 135-143 - Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel

, Emmanuele Zambon:
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. 144-156
Modeling Security
- Ole Martin Dahl, Stephen D. Wolthusen:

Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets. 157-168 - Kevin Kahley, Manigandan Radhakrishnan, Jon A. Solworth:

Factoring High Level Information Flow Specifications into Low Level Access Controls. 169-186

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














