Abstract is missing.
- A Methodology for Designing Countermeasures against Current and Future Code Injection AttacksYves Younan, Wouter Joosen, Frank Piessens. 3-20
- Making the Kernel Responsible: A New Approach to Detecting & Preventing Buffer OverflowsWilliam R. Speirs. 21-32
- Evaluation of Worm Containment Algorithms and Their Effect on Legitimate TrafficMohamed Abdelhafez, George F. Riley. 33-42
- Malware Defense Using Network Security AuthenticationJoseph V. Antrosio, Errin W. Fulp. 43-54
- A General Cooperative Intrusion Detection Architecture for MANETsDaniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chin-Yang Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe. 57-70
- SAWAN: A Survivable Architecture for Wireless LANsMohit Virendra, Shambhu J. Upadhyaya, Vivek Kumar, Vishal Anand. 71-82
- Meta IDS Environments: An Event Message Anomaly Detection ApproachJens Tölle, Marko Jahnke, Michael Bussmann, Sven Henkel. 85-94
- An Alert Fusion Framework for Situation Awareness of Coordinated Multistage AttacksSunu Mathew, Chintan Shah, Shambhu J. Upadhyaya. 95-104
- Stellar: A Fusion System for Scenario Construction and Security Risk AssessmentStephen Boyer, Oliver Dain, Robert Cunningham. 105-116
- Attack-Potential-Based Survivability Modeling for High-Consequence SystemsJohn McDermott. 119-130
- Enforcing Messaging Security PoliciesJaromir Likavec, Stephen D. Wolthusen. 131-138
- The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational AwarenessXiaoxin Yin, William Yurcik, Adam J. Slagell. 141-153
- Forensic Analysis of File System Intrusions Using Improved BacktrackingSriranjani Sitaraman, Subbarayan Venkatesan. 154-163
- Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection ModelsZhen Liu, Susan M. Bridges, Rayford B. Vaughn. 164-177