The Community for Technology Leaders
First IEEE International Workshop on Information Assurance (IWIA'03) (2003)
Darmstadt, Germany
Mar. 24, 2003 to Mar. 24, 2003
ISBN: 0-7695-1886-9
Session I: Intrusion Detection I

Designing a Framework for Active Worm Detection on Global Networks (Abstract)

Vincent Berk , Dartmouth College
George Bakos , Dartmouth College
Robert Morris , Dartmouth College
pp. 13

A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors (Abstract)

Ramkumar Chinchani , State University of New York at Buffalo
Shambhu Upadhyaya , State University of New York at Buffalo
Kevin Kwiat , Air Force Research Laboratory
pp. 25
Session II: Requirements and Metrics

Computational Complexity of the Network Routing Logical Security Assessment Process (Abstract)

Cedric Llorens , Equant, Network Security Department
Denis Valois , Equant, Network Security Department
Yannick Le Teigner , Equant, Network Security Department
Alexandre Gibouin , Equant, Network Security Department
pp. 37

IT Design Critieria for Damage Reduction (Abstract)

Volker Hammer , Secorvo Security Consulting GmbH Karlsruhe
pp. 49
Session III: Intrusion Detection II

Intrusion Detection Testing and Benchmarking Methodologies (Abstract)

Nicholas Athanasiades , Georgia Institute of Technology
Randal Abler , Georgia Institute of Technology
John Levine , Georgia Institute of Technology
Henry Owen , Georgia Institute of Technology
George Riley , Georgia Institute of Technology
pp. 63

Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection (Abstract)

Lawrence Teo , University of North Carolina at Charlotte and Calyptix Security Corporation
Yuliang Zheng , University of North Carolina at Charlotte and Calyptix Security Corporation
Gail-Joon Ahn , University of North Carolina at Charlotte
pp. 73
Session IV: Systems and Applications

Protecting the Integrity of an Entire File System (Abstract)

Fujita Tomonori , NTT Network Innovation Laboratories
Ogawara Masanori , NTT Network Innovation Laboratories
pp. 95

Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level Issue (Abstract)

John R. James , United States Military Academy
Frank Mabry , United States Military Academy
pp. 109
Author Index

Author Index (PDF)

pp. 113
94 ms
(Ver 3.3 (11022016))