• I
  • IWIA
  • 2004
  • Second IEEE International Information Assurance Workshop (IWIA'04)
Advanced Search 
Second IEEE International Information Assurance Workshop (IWIA'04)
Charlotte, North Carolina
April 08-April 09
ISBN: 0-7695-2117-7
Table of Contents
null
Session: Network Security Metrics and Tools
Yen-Hung Hu, George Washingtin University, Washington, DC
Hongsik Choi, Virginia Commonwealth University, Richmond, VA
Hyeong-Ah Choi, George Washingtin University, Washington, DC
pp. 3
Gustave Anderson, Drexel University, Philadelphia, PA
Leonardo Urbano, Drexel University, Philadelphia, PA
Gaurav Naik, Drexel University, Philadelphia, PA
David Dorsey, Drexel University, Philadelphia, PA
Andrew Mroczkowski, Drexel University, Philadelphia, PA
Donovan Artz, Drexel University, Philadelphia, PA
Nicholas Morizio, Drexel University, Philadelphia, PA
Andrew Burnheimer, Drexel University, Philadelphia, PA
Kris Malfetone, Drexel University, Philadelphia, PA
Dan Lapadat, Drexel University, Philadelphia, PA
Evan Sultanik, Drexel University, Philadelphia, PA
Saturnino Garcia, Drexel University, Philadelphia, PA
Max Peysakhov, Drexel University, Philadelphia, PA
William Regli, Drexel University, Philadelphia, PA
Moshe Kam, Drexel University, Philadelphia, PA
pp. 19
Giuseppe Ateniese, Johns Hopkins University
Chris Riley, Johns Hopkins University
Christian Scheideler, Johns Hopkins University
pp. 33
Session: Intrusion Detection
John Zachary, University of South Carolina, Columbia
John McEachen, Naval Postgraduate School, Monterey, CA
Dan Ettlich, Naval Postgraduate School, Monterey, CA
pp. 59
Brian D. Carrier, Purdue University, West Lafayette, IN
Blake Matheny, Purdue University, West Lafayette, IN
pp. 71
Gautam Singaraju, University of North Carolina at Charlotte
Lawrence Teo, University of North Carolina at Charlotte; Calyptix Security Corporation, Charlotte, NC
Yuliang Zheng, University of North Carolina at Charlotte; Calyptix Security Corporation, Charlotte, NC
pp. 79
Session: Host Security
Session: Modeling and Evaluation
Paul A. Karger, IBM Corp., T. J. Watson Research Center, Yorktown Heights, NY
Helmut Kurth, atsec information security GmbH, Munich, Germany
pp. 129
Lawrence Teo, University of North Carolina at Charlotte; Calyptix Security Corporation, Charlotte, NC
Yu-An Sun, University of North Carolina at Charlotte
Gail-Joon Ahn, University of North Carolina at Charlotte
pp. 155
Usage of this product signifies your acceptance of the Terms of Use.