ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Second IEEE International Information Assurance Workshop, 2004. Proceedings.
Latest Publications
TOTAL DOCUMENTS
20
(FIVE YEARS 0)
H-INDEX
4
(FIVE YEARS 0)
Published By IEEE
0769521177
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table
Second IEEE International Information Assurance Workshop, 2004. Proceedings.
◽
10.1109/iwia.2004.1288042
◽
2004
◽
Cited By ~ 17
Author(s):
J. Levine
◽
J. Grizzard
◽
H. Owen
Keyword(s):
System Call
◽
Kernel Level
Download Full-text
Survivable monitoring in dynamic networks
Second IEEE International Information Assurance Workshop, 2004. Proceedings.
◽
10.1109/iwia.2004.1288036
◽
2004
◽
Cited By ~ 1
Author(s):
G. Ateniese
◽
C. Riley
◽
C. Scheideler
Keyword(s):
Dynamic Networks
Download Full-text
A testbed for quantitative assessment of intrusion detection systems using fuzzy logic
Second IEEE International Information Assurance Workshop, 2004. Proceedings.
◽
10.1109/iwia.2004.1288040
◽
2004
◽
Cited By ~ 3
Author(s):
G. Singaraju
◽
L. Teo
◽
Yuliang Zheng
Keyword(s):
Fuzzy Logic
◽
Intrusion Detection
◽
Quantitative Assessment
◽
Intrusion Detection Systems
◽
Detection Systems
Download Full-text
Defeating internet attacks using risk awareness and active honeypots
Second IEEE International Information Assurance Workshop, 2004. Proceedings.
◽
10.1109/iwia.2004.1288045
◽
2004
◽
Cited By ~ 1
Author(s):
L. Teo
◽
Yu-An Sun
◽
Gail-Joon Ahn
Keyword(s):
Risk Awareness
Download Full-text
Increased information flow needs for high-assurance composite evaluations
Second IEEE International Information Assurance Workshop, 2004. Proceedings.
◽
10.1109/iwia.2004.1288043
◽
2004
◽
Cited By ~ 3
Author(s):
P.A. Karger
◽
H. Kurth
Keyword(s):
Information Flow
◽
High Assurance
Download Full-text
Packet filtering for congestion control under DoS attacks
Second IEEE International Information Assurance Workshop, 2004. Proceedings.
◽
10.1109/iwia.2004.1288034
◽
2004
◽
Cited By ~ 1
Author(s):
Yen-Hung Hu
◽
Hongsik Choi
◽
Hyeong-Ah Choi
Keyword(s):
Congestion Control
◽
Dos Attacks
◽
Packet Filtering
Download Full-text
A systematic approach to multi-stage network attack analysis
Second IEEE International Information Assurance Workshop, 2004. Proceedings.
◽
10.1109/iwia.2004.1288037
◽
2004
◽
Cited By ~ 43
Author(s):
J. Dawkins
◽
J. Hale
Keyword(s):
Systematic Approach
◽
Network Attack
◽
Multi Stage
Download Full-text
Protection against indirect overflow attacks on pointers
Second IEEE International Information Assurance Workshop, 2004. Proceedings.
◽
10.1109/iwia.2004.1288041
◽
2004
◽
Cited By ~ 2
Author(s):
Ge Zhu
◽
A. Tyagi
Download Full-text
A secure wireless agent-based testbed
Second IEEE International Information Assurance Workshop, 2004. Proceedings.
◽
10.1109/iwia.2004.1288035
◽
2004
◽
Cited By ~ 2
Author(s):
G. Anderson
◽
L. Urbano
◽
G. Naik
◽
D. Dorsey
◽
A. Mroczkowski
◽
...
Keyword(s):
Agent Based
Download Full-text
Conversation exchange dynamics for real-time network monitoring and anomaly detection
Second IEEE International Information Assurance Workshop, 2004. Proceedings.
◽
10.1109/iwia.2004.1288038
◽
2004
◽
Cited By ~ 4
Author(s):
J. Zachary
◽
J. McEachen
◽
D. Ettlich
Keyword(s):
Anomaly Detection
◽
Real Time
◽
Network Monitoring
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close