The Community for Technology Leaders
2010 International Workshop on Innovative Architecture for Future Generation High Performance (2005)
College Park, Maryland
Mar. 23, 2005 to Mar. 24, 2005
ISBN: 0-7695-2317-X
TABLE OF CONTENTS
Introduction

Program Committee (PDF)

pp. viii
Malware Defense

A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks (Abstract)

Yves Younan , Katholieke Universiteit Leuven
Wouter Joosen , Katholieke Universiteit Leuven
Frank Piessens , Katholieke Universiteit Leuven
pp. 3-20

Evaluation of Worm Containment Algorithms and Their Effect on Legitimate Traffic (Abstract)

Mohamed Abdelhafez , Georgia Institute of Technology
George F. Riley , Georgia Institute of Technology
pp. 33-42

Malware Defense Using Network Security Authentication (Abstract)

Joseph V. Antrosio , Wake Forest University
Errin W. Fulp , Wake Forest University
pp. 43-54
MANET Security

A General Cooperative Intrusion Detection Architecture for MANETs (Abstract)

D. Sterne , McAfee Research
P. Balasubramanyam , University of California at Davis
D. Carman , McAfee Research
B. Wilson , McAfee Research
R. Talpade , Telcordia Technologies
C. Ko , McAfee Research
R. Balupari , McAfee Research
C-Y. Tseng , University of California at Davis
T. Bowen , Telcordia Technologies
K. Levitt , University of California at Davis
J. Rowe , University of California at Davis
pp. 57-70

SAWAN: A Survivable Architecture for Wireless LANs (Abstract)

Mohit Virendra , State University of New York at Buffalo
Shambhu Upadhyaya , State University of New York at Buffalo
Vivek Kumar , State University of New York at Buffalo
Vishal Anand , State University of New York at Brockport
pp. 71-82
Intrusion Detection I

Meta IDS Environments: An Event Message Anomaly Detection Approach (Abstract)

Jens Tölle , Research Establishment for Applied Science
Marko Jahnke , Research Establishment for Applied Science
Michael Bussmann , Research Establishment for Applied Science
Sven Henkel , Research Establishment for Applied Science
pp. 85-94

An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks (Abstract)

Sunu Mathew , State University of New York at Buffalo
Chintan Shah , State University of New York at Buffalo
Shambhu Upadhyaya , State University of New York at Buffalo
pp. 95-104

Stellar: A Fusion System for Scenario Construction and Security Risk Assessment (Abstract)

Stephen Boyer , Massachussets Institute of Technology
Oliver Dain , Massachussets Institute of Technology
Robert Cunningham , Massachussets Institute of Technology
pp. 105-116
Modeling and Policies

Enforcing Messaging Security Policies (Abstract)

Jaromir Likavec , Fraunhofer-IGD
Stephen D. Wolthusen , Fraunhofer-IGD
pp. 131-138
Intrusion Detection II

The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness (Abstract)

Xiaoxin Yin , University of Illinois at Urbana-Champaign
William Yurcik , University of Illinois at Urbana-Champaign
Adam Slagell , University of Illinois at Urbana-Champaign
pp. 141-153

Forensic Analysis of File System Intrusions Using Improved Backtracking (Abstract)

Sriranjani Sitaraman , University of Texas at Dallas
S. Venkatesan , University of Texas at Dallas
pp. 154-163

Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models (Abstract)

Zhen Liu , Mississippi State University
Susan M. Bridges , Mississippi State University
Rayford B. Vaughn , Mississippi State University
pp. 164-177
Author Index

Author Index (PDF)

pp. 179
79 ms
(Ver 3.3 (11022016))