The Community for Technology Leaders
2010 International Workshop on Innovative Architecture for Future Generation High Performance (2003)
Darmstadt, Germany
Mar. 24, 2003 to Mar. 24, 2003
ISBN: 0-7695-1886-9
Session I: Intrusion Detection I

Designing a Framework for Active Worm Detection on Global Networks (Abstract)

Vincent Berk , Dartmouth College
Robert Morris , Dartmouth College
George Bakos , Dartmouth College
pp. 13

A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors (Abstract)

Kevin Kwiat , Air Force Research Laboratory
Ramkumar Chinchani , State University of New York at Buffalo
Shambhu Upadhyaya , State University of New York at Buffalo
pp. 25
Session II: Requirements and Metrics

Computational Complexity of the Network Routing Logical Security Assessment Process (Abstract)

Alexandre Gibouin , Equant, Network Security Department
Cedric Llorens , Equant, Network Security Department
Denis Valois , Equant, Network Security Department
Yannick Le Teigner , Equant, Network Security Department
pp. 37

IT Design Critieria for Damage Reduction (Abstract)

Volker Hammer , Secorvo Security Consulting GmbH Karlsruhe
pp. 49
Session III: Intrusion Detection II

Intrusion Detection Testing and Benchmarking Methodologies (Abstract)

John Levine , Georgia Institute of Technology
Nicholas Athanasiades , Georgia Institute of Technology
Henry Owen , Georgia Institute of Technology
George Riley , Georgia Institute of Technology
Randal Abler , Georgia Institute of Technology
pp. 63

Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection (Abstract)

Yuliang Zheng , University of North Carolina at Charlotte and Calyptix Security Corporation
Lawrence Teo , University of North Carolina at Charlotte and Calyptix Security Corporation
Gail-Joon Ahn , University of North Carolina at Charlotte
pp. 73
Session IV: Systems and Applications

Protecting the Integrity of an Entire File System (Abstract)

Ogawara Masanori , NTT Network Innovation Laboratories
Fujita Tomonori , NTT Network Innovation Laboratories
pp. 95

Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level Issue (Abstract)

Frank Mabry , United States Military Academy
John R. James , United States Military Academy
pp. 109
Author Index

Author Index (PDF)

pp. 113
106 ms
(Ver 3.1 (10032016))