The Community for Technology Leaders
RSS Icon
Subscribe
2006 22nd Computer Security Applications Conference (2006)
Miami Beach, FL
Dec. 11, 2006 to Dec. 15, 2006
ISBN: 0-7695-2716-7
TABLE OF CONTENTS
Reviewers (PDF)
pp.
Introduction
Preface (PDF)
pp. ix
Reviewers (PDF)
pp. xi-xii
pp. xiii
Sponsors (PDF)
pp. xiv
Distinguished Practitioner
Session: Applied Distributed Collaboration
Trent Jaeger , Pennsylvania State University, USA
Stefan Berger , IBM T.J. Watson Research Center, USA
Ramon Caceres , IBM T.J. Watson Research Center, USA
Jonathan M. McCune , Carnegie Mellon University, USA
pp. 23-32
Jelena Mirkovic , University of Delaware, USA
Peter Reiher , UCLA, USA
Max Robinson , Aerospace Corporation
pp. 33-42
Dongyu Liu , George Mason University, USA
Shiping Chen , George Mason University, USA; Sybase Inc., USA
Sushil Jajodia , George Mason University, USA
pp. 43-56
Session: Client Access in Untrusted Environments
Timothy W. van der Horst , Brigham Young University, USA
Sharad Mehrotra , University of California, Irvine, USA
Ravi Chandra Jammalamadaka , University of California, Irvine, USA
Nalini Venkasubramanian , University of California, Irvine, USA
pp. 57-66
Dinei Florencio , Microsoft Research, USA
Cormac Herley , Microsoft Research, USA
pp. 67-76
Collin Mulliner , University of California, Santa Barbara, USA
Giovanni Vigna , University of California, Santa Barbara, USA
pp. 77-88
Session: Network Intrusion Detection
Cristian Estan , University of Wisconsin-Madison, USA
Somesh Jha , University of Wisconsin-Madison, USA
pp. 89-98
Somesh Jha , University of Wisconsin-Madison, USA
Vinod Ganapathy , University of Wisconsin-Madison, USA
pp. 99-108
Jeffrey Horton , University of Wollongong, Australia
Rei Safavi-Naini , University of Wollongong, Australia
pp. 109-120
Session: Network Security
Richard Lippmann , MIT Lincoln Laboratory, USA
Keith Piwowarski , MIT Lincoln Laboratory, USA
pp. 121-130
Pai Peng , Opsware Inc.
Kun Sun , Intelligent Automation, Inc.
Cliff Wang , Army Research Office
pp. 131-140
Rupinder Gill , Queensland University of Technology, Australia
Andrew Clark , Queensland University of Technology, Australia
pp. 141-152
Session: Security in Systems
Boniface Hicks , Pennsylvania State University, USA
Patrick McDaniel , Pennsylvania State University, USA
pp. 153-164
Michael Korman , University of Connecticut, USA
Aggelos Kiayias , University of Connecticut, USA
pp. 165-174
Lillian Rostad , Norwegian University of Science and Technology (NTNU), Norway
pp. 175-186
Invited Essayist
Brian Witten , Symantec Research Labs
pp. 187-202
Session: Applied Sandboxing
Philip W.L. Fong , University of Regina, Canada
pp. 203-212
Wei Li , Stony Brook University
Lap-chung Lam , Stony Brook University
Tzi-cker Chiueh , Stony Brook University
pp. 213-222
Raj Swaminathan , University of Illinois, Chicago, USA
V.N. Venkatakrishnan , University of Illinois, Chicago, USA
pp. 223-234
Session: Malware
Xun Wang , The Ohio State University, USA
Prasad Calyam , The Ohio State University, USA
Dong Xuan , The Ohio State University, USA
Wei Yu , Texas A&M University, USA
pp. 235-244
Guanhua Yan , Los Alamos National Laboratory
pp. 245-256
Hao Chen , University of California, Davis, USA
Thomas Ristenpart , University of California, Davis, USA; University of California, San Diego, USA
Jason Li , University of California, Davis, USA; Microsoft Corporation
Francis Hsu , University of California, Davis, USA
pp. 257-268
Session: Applied Detection Technologies
Marco Cova , University of California, Santa Barbara, USA
Greg Banks , University of California, Santa Barbara, USA
Giovanni Vigna , University of California, Santa Barbara, USA
pp. 269-278
Wei Li , SUNY at Stony Brook, USA
Lap-Chung Lam , SUNY at Stony Brook, USA
Tzi-cker Chiueh , SUNY at Stony Brook, USA
pp. 279-288
Mitch Halpin , Georgia Institute of Technology, USA
David Dagon , Georgia Institute of Technology, USA
Robert Edmonds , Georgia Institute of Technology, USA
Wenke Lee , Georgia Institute of Technology, USA
pp. 289-300
Classic Papers
Peter G. Neumann , SRI International, USA
pp. 321-328
Session: Applied Randomization
Lixin Li , Global InfoTek, Inc., USA
R. Sekar , Stony Brook University, USA
pp. 329-338
Chongkyung Kil , North Carolina State University, USA
Jinsuk Jun , North Carolina State University, USA
Christopher Bookholt , North Carolina State University, USA
Jun Xu , Google, Inc.
Peng Ning , North Carolina State University, USA
pp. 339-348
Yoav Weiss , Discretix Technologies Ltd., Israel
pp. 349-360
Session: Intrusion Detection
Francois Gagnon , Carleton University, Canada
Yvan Labiche , Carleton University, Canada
Lionel Briand , Carleton University, Canada
Mathieu Couture , Carleton University, Canada
pp. 361-370
Nigel Jacob , Tufts University, USA
pp. 371-380
Ying Pan , Singapore Management University, Singapore
Xuhua Ding , Singapore Management University, Singapore
pp. 381-392
Session: Messaging Security
P.C. van Oorschot , Carleton University, Canada
Evangelos Kranakis , Carleton University, Canada
pp. 393-402
Omid Fatemieh , University of Illinois Urbana-Champaign, USA
Fariba Khan , University of Illinois Urbana-Champaign, USA
Carl A. Gunter , University of Illinois Urbana-Champaign, USA
Rakesh Bobba , University of Illinios Urbana-Champaign, USA
pp. 403-413
Jeff Yan , Newcastle University, UK
pp. 414-428
Session: Countermeasures
Davide Pozza , Politecnico di Torino, Italy
Frank Piessens , Katholieke Universiteit Leuven, Belgium
Yves Younan , Katholieke Universiteit Leuven, Belgium
pp. 429-438
Ashish Gehani , University of Notre Dame
pp. 439-448
Kun Bai , The Pennsylvania State University, USA
Peng Liu , The Pennsylvania State University, USA
pp. 449-462
Session: Information Flow and Leakage
Zhenghong Wang , Princeton University
pp. 473-482
Michael K. Reiter , Carnegie Mellon University, USA
Yinglian Xie , Carnegie Mellon University, USA
pp. 493-504
Author Index
Author Index (PDF)
pp. 505-506
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool