Hamid R. Arabnia, Youngsong Mun (Eds.):
Proceedings of the International Conference on Security and Management, SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1.
CSREA Press 2003, ISBN 1-932415-16-5 BibTeX
@proceedings{DBLP:conf/csreaSAM/2003-1,
editor = {Hamid R. Arabnia and
Youngsong Mun},
title = {Proceedings of the International Conference on Security and Management,
SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1},
booktitle = {Security and Management},
publisher = {CSREA Press},
year = {2003},
isbn = {1-932415-16-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Security Issues for Networks
- Michael G. Merideth, Priya Narasimhan:
Proactive Containment of Malice in Survivable Distributed Systems.
3-9 BibTeX
- Hongmei Deng, Qing-An Zeng, Dharma P. Agrawal:
Network Intrusion Detection System Using Random Projection Technique.
10-16 BibTeX
- Thomas Droste, Wolfgang Weber:
Additional Security Requirements to Integrate Wireless Networks.
17-19 BibTeX
- Jinoh Kim, Ik-Kyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang:
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks.
20-26 BibTeX
- Alexandros G. Fragkiadakis, Nikolaos G. Bartzoudis, David J. Parish, Mark Sandford:
Hardware Support for Active Networking.
27-33 BibTeX
- Kafi Hassan, Michael Conner:
Identifying Security Threats in Ad Hoc Wireless Network.
34-40 BibTeX
Trust-Based Methodologies
Security:
Management and Protocols
Authentication and Passwords
Security:
Policies and Analysis
Intrusion Detection
Architecture,
Policy and Management
- Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, Serban I. Gavrila, Vlad Korolev:
Security Policy Management for Handheld Devices.
199-204 BibTeX
- Pavan K. Sura, Ravi Mukkamala:
A PKI Architecture for Academic Institutions: Design and Prototype.
205-212 BibTeX
- Yan Yan, Yi Huang, Geoffrey Fox, Shrideep Pallickara, Marlon E. Pierce, Ali Kaplan, Ahmet E. Topcu:
Implementing a Prototype of the Security Framework for Distributed Brokering Systems.
212-218 BibTeX
- Kyeong Ja Jeong, Moon Sun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim:
Alert Analysis Using Data Mining for Security Policy Server in Policy Based Network Security Management.
219-225 BibTeX
- Tony White, Eugen Bacic:
Implementing Policy-Based Content Filtering for Web Servers.
226-232 BibTeX
- Ron Forrester:
Trusted Platforms and Integrity Management: Scaling TCPA to the Enterprise.
233-240 BibTeX
Algorithmic Techniques for Security
Security Techniques and Applications
Models and Analyses for Security
- James F. Smith III:
Automated Resource Manager for Group Security.
303-309 BibTeX
- Maheshkumar Sabhnani, Gürsel Serpen:
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection.
310-316 BibTeX
- Yanet Manzano:
FDS Model: A Distributed Architectural Design for Management of Inbound Network Traffic on Web-Server Systems.
317-323 BibTeX
- Kyoung-Ja Kim, Sung-Ock Hong, Tae-Mu Chang:
Agent Based Intrusion Tolerance Scheme in Ad Hoc Networks.
324-329 BibTeX
- ManHee Lee, Sangkil Jung, Younjoo Kwon, KookHan Kim, Jeonghoon Moon, Okhwan Byeon:
Spanning Tree Search Model to Traceback DDoS Attack Using Netflow.
330-333 BibTeX
- Yoon-Jung Jung, In-Jung Kim:
The Development for the Risk Assessment Methodology of Spiral Model.
334-336 BibTeX
- Su-Hyung Jo, Jeong-Nyeo Kim, Sung Won Sohn:
Design of Policy-Based Security Management for Intrusion Detection.
337-340 BibTeX
- Evon M. Abu-Taieh, Sattar J. Aboud:
A New Factoring Algorithm.
341-347 BibTeX
- Peyman Nasirifard:
Web Services Security Overview and Security Proposal for UDDI Framework.
348-351 BibTeX
- Moon-Ku Lee:
Stability Verification of Proxy Firewall Using Colored Petri Nets.
352-358 BibTeX
- Lau Nga Sin, Moon-Chuen Lee:
Intrusion Detection System Models.
359-366 BibTeX
Copyright © Sat May 16 23:04:18 2009
by Michael Ley (ley@uni-trier.de)