The Community for Technology Leaders
2010 International Workshop on Innovative Architecture for Future Generation High Performance (2004)
Charlotte, North Carolina
Apr. 8, 2004 to Apr. 9, 2004
ISBN: 0-7695-2117-7
TABLE OF CONTENTS

Preface (PDF)

pp. vii

Committee Members (PDF)

pp. viii
Session: Network Security Metrics and Tools

Packet Filtering for Congestion Control under DoS Attacks (Abstract)

Yen-Hung Hu , George Washingtin University, Washington, DC
Hongsik Choi , Virginia Commonwealth University, Richmond, VA
Hyeong-Ah Choi , George Washingtin University, Washington, DC
pp. 3

A Secure Wireless Agent-based Testbed (Abstract)

Saturnino Garcia , Drexel University, Philadelphia, PA
Evan Sultanik , Drexel University, Philadelphia, PA
Gustave Anderson , Drexel University, Philadelphia, PA
Leonardo Urbano , Drexel University, Philadelphia, PA
Nicholas Morizio , Drexel University, Philadelphia, PA
David Dorsey , Drexel University, Philadelphia, PA
Donovan Artz , Drexel University, Philadelphia, PA
William Regli , Drexel University, Philadelphia, PA
Andrew Mroczkowski , Drexel University, Philadelphia, PA
Max Peysakhov , Drexel University, Philadelphia, PA
Kris Malfetone , Drexel University, Philadelphia, PA
Gaurav Naik , Drexel University, Philadelphia, PA
Dan Lapadat , Drexel University, Philadelphia, PA
Andrew Burnheimer , Drexel University, Philadelphia, PA
Moshe Kam , Drexel University, Philadelphia, PA
pp. 19

Survivable Monitoring in Dynamic Networks (Abstract)

Chris Riley , Johns Hopkins University
Giuseppe Ateniese , Johns Hopkins University
Christian Scheideler , Johns Hopkins University
pp. 33
Session: Intrusion Detection

Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection (Abstract)

John Zachary , University of South Carolina, Columbia
John McEachen , Naval Postgraduate School, Monterey, CA
Dan Ettlich , Naval Postgraduate School, Monterey, CA
pp. 59

Methods for Cluster-Based Incident Detection (Abstract)

Brian D. Carrier , Purdue University, West Lafayette, IN
Blake Matheny , Purdue University, West Lafayette, IN
pp. 71

A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic (Abstract)

Lawrence Teo , University of North Carolina at Charlotte; Calyptix Security Corporation, Charlotte, NC
Yuliang Zheng , University of North Carolina at Charlotte; Calyptix Security Corporation, Charlotte, NC
Gautam Singaraju , University of North Carolina at Charlotte
pp. 79
Session: Host Security

Protection against Indirect Overflow Attacks on Pointers (Abstract)

Akhilesh Tyagi , Iowa State University, Ames
Ge Zhu , Iowa State University, Ames
pp. 97

A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table (Abstract)

John Levine , Georgia Institute of Technology
Henry Owen , Georgia Institute of Technology
Julian Grizzard , Georgia Institute of Technology
pp. 107
Session: Modeling and Evaluation

Increased Information Flow Needs for High-Assurance Composite Evaluations (Abstract)

Helmut Kurth , atsec information security GmbH, Munich, Germany
Paul A. Karger , IBM Corp., T. J. Watson Research Center, Yorktown Heights, NY
pp. 129

A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions (Abstract)

Partha Dasgupta , Arizona State University
Mujtaba Khambatti , Microsoft Corporation
Kyung Dong Ryu , Arizona State University
pp. 141

Defeating Internet Attacks Using Risk Awareness and Active Honeypots (Abstract)

Lawrence Teo , University of North Carolina at Charlotte; Calyptix Security Corporation, Charlotte, NC
Yu-An Sun , University of North Carolina at Charlotte
Gail-Joon Ahn , University of North Carolina at Charlotte
pp. 155

Author Index (PDF)

pp. 169
111 ms
(Ver )