Abstract is missing.
- An Intellilgent Infrastructure Strategy to Improvilng the Performance and Detection Capability of Intrusion Detection SystemsEmmanuel Hooper. 1-15 [doi]
- Work in Progress - Tracking Correlated Attacks in Enterprise Intranets through LatticesSule Simsek. 1-2 [doi]
- MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless NetworksIssa M. Khalil, Saurabh Bagchi, Ness B. Shroff. 1-12 [doi]
- Non-Invasive Methods for Host CertificationPatrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick McDaniel. 1-10 [doi]
- Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed FilteringJonathan T. Trostle. 1-11 [doi]
- Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker IdentificationLiang Xie, Sencun Zhu. 1-10 [doi]
- Detecting the Sybil Attack in Mobile Ad hoc NetworksChris Piro, Clay Shields, Brian Neil Levine. 1-11 [doi]
- A Double Horizon Defense Design for Robust Regulation of Malicious TrafficYing Xu, Roch Guérin. 1-11 [doi]
- Efficient visualization of change events in enterprise networksAndrew Stewart. 1-6 [doi]
- Towards Cooperative Self-Protecting Mobile Devices using Trustful RelationshipsStephan Groß. 1-7 [doi]
- Secure Real-time User Preference Collection for Broadcast SchedulingXuhua Ding, Shuhong Wang, Baihua Zheng. 1-10 [doi]
- Enabling Confidentiality in Content-Based Publish/Subscribe InfrastructuresCostin Raiciu, David S. Rosenblum. 1-11 [doi]
- Implementation and Performance Evaluation of EAP-TLS-KSJared Cordasco, Ulrike Meyer, Susanne Wetzel. 1-12 [doi]
- On Filtering of DDoS Attacks Based on Source Address PrefixesGary Pack, Jaeyoung Yoon, Eli Collins, Cristian Estan. 1-12 [doi]
- An Intellilgent Infrastructure Strategy to Improving the Performance and Detection Capability of Intrusion Detection SystemsEmmanuel Hooper. 1-10 [doi]
- Discount Anonymous On Demand Routing for Mobile Ad hoc NetworksLiu Yang, Markus Jakobsson, Susanne Wetzel. 1-10 [doi]
- TOPO: A Topology-aware Single Packet Attack Traceback SchemeLinfeng Zhang, Yong Guan. 1-10 [doi]
- Computing with Trust: Definition, Properties, and AlgorithmsJennifer Golbeck. 1-7 [doi]
- Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication ProtocolsMike Burmester, Tri Van Le, Breno de Medeiros. 1-9 [doi]
- DaTA - Data-Transparent Authentication Without Communication OverheadSongqing Chen, Shiping Chen, Xinyuan Wang, Sushil Jajodia. 1-10 [doi]
- Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's BatteryRadmilo Racic, Denys Ma, Hao Chen. 1-10 [doi]
- Enhancing Privacy Preservation of Anonymous Location Sampling Techniques in Traffic Monitoring SystemsBaik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady. 1-3 [doi]
- Mithril: Adaptable Security for Survivability in Collaborative Computing SitesJim Basney, Patrick Flanigan, Jin Heo, Himanshu Khurana, Joe Muggli, Meenal Pant, Adam J. Slagell, Von Welch. 1-7 [doi]
- A Distributed Stealthy Coordination Mechanism for Worm SynchronizationGaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya Krishnan, Adrian Perrig. 1-8 [doi]
- Reputation-Based Algorithm for Managing Trust in File Sharing NetworksLara Srour, Ayman I. Kayssi, Ali Chehab. 1-10 [doi]
- Wavelet-based Real Time Detection of Network Traffic AnomaliesChin-Tser Huang, Sachin Thareja, Yong-June Shin. 1-7 [doi]
- Work in Progress: Who is Watching You? Video Conferencing SecurityNavid Jam, Elliot Proebstel. 1-2 [doi]
- S-DV: A new approach to Secure Distance Vector routing protocolsAbdelaziz Babakhouya, Yacine Challal, Abdelmadjid Bouabdallah, Said Gharout. 1-10 [doi]
- A Flexible Approach to Intrusion Alert Anonymization and CorrelationDingbang Xu, Peng Ning. 1-10 [doi]
- A Unified Framework for Trust ManagementWeiliang Zhao, Vijay Varadharajan, George Bryan. 1-8 [doi]
- System Anomaly Detection: Mining Firewall LogsRobert M. Winding, Timothy E. Wright, Michael J. Chapple. 1-5 [doi]
- On Mobile Viruses Exploiting Messaging and Bluetooth ServicesAbhijit Bose, Kang G. Shin. 1-10 [doi]
- Work in Progress: Streamlined IT Risk Management through a Micro Risk Management System (μRMS)Timothy E. Wright, Michael J. Chapple, Robert M. Winding. 1-2 [doi]
- Flow Anomaly Detection in Firewalled NetworksMichael J. Chapple, Timothy E. Wright, Robert M. Winding. 1-6 [doi]
- Leveraging IPsec for Mandatory Per-Packet Access ControlTrent Jaeger, David H. King, Kevin R. B. Butler, Serge Hallyn, Joy Latten, Xiaolan Zhang. 1-9 [doi]
- A Framework for Identifying Compromised Nodes in Sensor NetworksQing Zhang, Ting Yu, Peng Ning. 1-10 [doi]
- Denial of Service Attacks and Defenses in Decentralized Trust ManagementJiangtao Li, Ninghui Li, Xiaofeng Wang, Ting Yu. 1-12 [doi]
- In-Band Wormholes and Countermeasures in OLSR NetworksPeter Kruus, Daniel Sterne, Richard Gopaul, Michael Heyman, Brian Rivera, Peter Budulas, Brian Luu, Tommy Johnson, Natalie Ivanic, Geoffrey Lawler. 1-11 [doi]
- A History-Based Framework to Build Trust Management SystemsSamuel Galice, Véronique Legrand, Marine Minier, John Mullins, Stéphane Ubéda. 1-7 [doi]
- An Identity-based Ring Signature Scheme with Enhanced PrivacyChandana Gamage, Ben Gras, Bruno Crispo, Andrew S. Tanenbaum. 1-5 [doi]
- Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN TrafficNicholas Weaver, Vern Paxson, Robin Sommer. 1-2 [doi]
- Passive Wireless Host Detection Using Local RTT Timing Characteristics on an Enterprise NetworkChad D. Mano, David A. Cieslak. 1-6 [doi]
- Distributed Authentication of Program Integrity Verification in Wireless Sensor NetworksKatharine Chang, Kang G. Shin. 1-10 [doi]
- An Infrastructure for Gaining Trust in Context InformationFrank Fransen, Sven Lachmund, Eddy Olk, Laurent Bussard. 1-10 [doi]
- Packet Coding for Strong Anonymity in Ad Hoc NetworksImad Aad, Claude Castelluccia, Jean-Pierre Hubaux. 1-10 [doi]
- Providing Tunable Security Services: An IEEE 802.11i ExampleStefan Lindskog, Anna Brunstrom, Zoltán Faigl, Katalin Toth. 1-10 [doi]
- Sensor Networks that Are Provably ResilientRoberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan. 1-10 [doi]
- Preventing Cross Site Request Forgery AttacksNenad Jovanovic, Engin Kirda, Christopher Kruegel. 1-10 [doi]
- Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc NetworksGeorge Theodorakopoulos, John S. Baras. 1-6 [doi]
- A Customizable Reputation-based Privacy Assurance System using Active FeedbackStephen Crane, Marco Casassa Mont. 1-8 [doi]
- Towards More Efficient Distance Bounding Protocols for Use in Sensor NetworksCatherine Meadows, Paul F. Syverson, LiWu Chang. 1-5 [doi]
- Outsourcing Security Analysis with Anonymized LogsJianqing Zhang, Nikita Borisov, William Yurcik. 1-9 [doi]
- Reputation-based Trust-Aware Recommender SystemSukumal Kitisin, Clifford Neuman. 1-7 [doi]
- Towards Communal Governed Transactions Among Decentralized Trading AgentsAvinanta Tarigan. 1-9 [doi]
- An Architecture for an Email Worm Prevention SystemMohamed Mahmoud Taibah, Ehab Al-Shaer, Raouf Boutaba. 1-9 [doi]
- Effective Detection of Active Worms with Varying Scan RateWei Yu, Xun Wang, Dong Xuan, David Lee. 1-10 [doi]