• D
  • DISCEX
  • 2003
  • DARPA Information Survivability Conference and Exposition - Volume I
Advanced Search 
DARPA Information Survivability Conference and Exposition - Volume I
Washington, DC
April 22-April 24
ISBN: 0-7695-1897-4
Table of Contents
Distributed Denial of Service (DDOS) Defenses
Christos Papadopoulos, Information Sciences Institute (ISI)
Robert Lindell, Information Sciences Institute (ISI)
John Mehringer, Information Sciences Institute (ISI)
Alefiya Hussain, Information Sciences Institute (ISI)
Ramesh Govindan, Information Sciences Institute (ISI)
pp. 2
Roshan Thomas, Network Associates, Inc.
Brian Mark, George Mason University
Tommy Johnson, Network Associates, Inc.
James Croall, Network Associates, Inc.
pp. 14
W. J. Blackert, The Johns Hopkins University
D. M. Gregg, The Johns Hopkins University
A. K. Castner, The Johns Hopkins University
E. M. Kyle, The Johns Hopkins University
R. L. Hom, The Johns Hopkins University
R. M. Jokerst, The Johns Hopkins University
pp. 26
Access Control, Authorization, and Anonymity
Robert Watson, Network Associates Laboratories
Brian Feldman, Network Associates Laboratories
Adam Migus, Network Associates Laboratories
Chris Vance, Network Associates Laboratories
pp. 38
Tatyana Ryutov, University of Southern California
Clifford Neuman, University of Southern California
Dongho Kim, University of Southern California
pp. 50
Survivability, Fault Tolerance, and Containment
Dick O?Brien, Secure Computing Corp.
Rick Smith, Secure Computing Corp.
Tammy Kappel, Secure Computing Corp.
Clint Bitzer, Secure Computing Corp.
pp. 90
Sandra Murphy, Network Associates Laboratories
Abhijit Hayatnagarkar, Network Associates Laboratories
Suresh Krishnaswamy, Network Associates Laboratories
Wayne Morrison, Network Associates Laboratories
Robert Watson, Network Associates Laboratories
pp. 97
Red Teams and Operational Experimentation
Crispin Cowan, WireX Communications, Inc.
Seth Arnold, WireX Communications, Inc.
Steve Beattie, WireX Communications, Inc.
Chris Wright, WireX Communications, Inc.
John Viega, Secure Software Inc.
pp. 120
Seth Robertson, System Detection, Inc.
Eric V. Siegel, System Detection, Inc.
Matt Miller, System Detection, Inc.
Salvatore J. Stolfo, Columbia University
pp. 130
Anomaly Detection
Trust Management
Angelos D. Keromytis, Columbia University
Sotiris Ioannidid, University of Pennsylvania
Michael B. Greenwald, University of Pennsylvania
Jonathan M. Smith, University of Pennsylvania
pp. 178
Routing and Group Communications
Yair Amir, Johns Hopkins University
Cristina Nita-Rotaru, Johns Hopkins University
Jonathan Stanton, George Washington University
Gene Tsudik, University of California, Irvine
pp. 226
MuCAPSL (Abstract)
Jon Millen, SRI International
Grit Denker, SRI International
pp. 238
Optical and Wireless Networking
Sava Stanic, George Washington University
Suresh Subramaniam, George Washington University
Hongsik Choi, George Washington University
Gokhan Sahin, George Washington University
Hyeong-Ah Choi, George Washington University
pp. 252
Sudarshan Vasudevan, University of Massachusetts
Brian DeCleene, ALPHATECH, Inc.
Neil Immerman, University of Massachusetts
Jim Kurose, University of Massachusetts
Don Towsley, University of Massachusetts
pp. 261
Rui Jiang, University of California, Riverside
Vikram Gupta, University of California, Riverside
Chinya V. Ravishankar, University of California, Riverside
pp. 273
Attack Modeling and Response
D. Nojiri, University of California, Davis
J. Rowe, University of California, Davis
K. Levitt, University of California, Davis
pp. 293
Laura Feinstein, The Boeing Company
Dan Schnackenberg, The Boeing Company
Ravindra Balupari, Network Associates Laboratories
Darrell Kindred, Network Associates Laboratories
pp. 303
Usage of this product signifies your acceptance of the Terms of Use.