ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
Latest Publications
TOTAL DOCUMENTS
79
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By IEEE
0780385721
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Security feature comparison for fibre channel storage area networks switches
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
◽
10.1109/iaw.2004.1437818
◽
2005
◽
Cited By ~ 1
Author(s):
C. DeCusatis
◽
R. Atkins
Keyword(s):
Fibre Channel
◽
Storage Area Networks
◽
Security Feature
◽
Storage Area
Download Full-text
A biometric authentication approach for high security ad-hoc networks
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
◽
10.1109/iaw.2004.1437824
◽
2005
◽
Cited By ~ 1
Author(s):
Qinghan Xiao
Keyword(s):
Ad Hoc Networks
◽
Ad Hoc
◽
Biometric Authentication
◽
High Security
◽
Hoc Networks
Download Full-text
Limitations of on demand secure routing protocols
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
◽
10.1109/iaw.2004.1437797
◽
2005
◽
Cited By ~ 4
Author(s):
P. Ramachandran
◽
A. Yasinsac
Keyword(s):
Routing Protocols
◽
Secure Routing
◽
On Demand
◽
Secure Routing Protocols
Download Full-text
Modeling critical infrastructure requirements
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
◽
10.1109/iaw.2004.1437804
◽
2005
◽
Cited By ~ 5
Author(s):
S.D. Wolthusen
Keyword(s):
Critical Infrastructure
Download Full-text
Simulation for training computer network operations
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
◽
10.1109/iaw.2004.1437835
◽
2005
◽
Author(s):
L.L. DeLooze
◽
P. McKean
◽
J.R. Mostow
◽
C. Graig
Keyword(s):
Computer Network
◽
Computer Network Operations
◽
Network Operations
Download Full-text
On the security of random key pre-distribution schemes
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
◽
10.1109/iaw.2004.1437811
◽
2005
◽
Cited By ~ 5
Author(s):
M. Ramkumar
◽
N. Memon
Download Full-text
Investigation of pushback based detection and prevention of network bandwidth attacks
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
◽
10.1109/iaw.2004.1437847
◽
2005
◽
Author(s):
Ningning Wu
◽
Jing Zhang
Keyword(s):
Network Bandwidth
Download Full-text
Agent based multiple level dynamic multimedia security system
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
◽
10.1109/iaw.2004.1437830
◽
2005
◽
Author(s):
Hongwei Li
◽
A. Dhawan
Keyword(s):
Multimedia Security
◽
Security System
◽
Multiple Level
◽
Agent Based
Download Full-text
Anomalous packet identification for network intrusion detection
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
◽
10.1109/iaw.2004.1437798
◽
2005
◽
Cited By ~ 5
Author(s):
D.H. Summerville
◽
N. Nwanze
◽
V.A. Skortnin
Keyword(s):
Intrusion Detection
◽
Network Intrusion Detection
◽
Network Intrusion
Download Full-text
Developing and delivering hands-on information assurance exercises: experiences with the cyber defense lab at UMBC
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
◽
10.1109/iaw.2004.1437823
◽
2005
◽
Cited By ~ 1
Author(s):
A.T. Sherman
◽
B.O. Roberts
◽
W.E. Byrd
◽
M.R. Baker
◽
J. Simmons
Keyword(s):
Information Assurance
◽
Cyber Defense
◽
Hands On
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close