Abstract is missing.
- MLS-PCA: A High Assurance Security Architecture for Future AvionicsClark Weissman. 2-13 [doi]
- Bayesian Event Classification for Intrusion DetectionChristopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur. 14-23 [doi]
- Intrusion Detection: A Bioinformatics ApproachScott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer. 24-33 [doi]
- A Stateful Intrusion Detection System for World-Wide Web ServersGiovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer. 34-45 [doi]
- Behavioral Authentication of Server FlowsJames P. Early, Carla E. Brodley, Catherine Rosenberg. 46-55 [doi]
- A Multi-View Tool for Checking the Security Semantics of Router ConfigurationsHolger Peine, Reinhard Schwarz. 56-65 [doi]
- S-ARP: a Secure Address Resolution ProtocolDanilo Bruschi, A. Ornaghi, Emilia Rosti. 66-75 [doi]
- Design, Implementation and Test of an Email Virus ThrottleMatthew M. Williamson. 76-85 [doi]
- Efficient Minimum-Cost Network Hardening Via Exploit Dependency GraphsSteven Noel, Sushil Jajodia, Brian O Berry, Michael Jacobs. 86-95 [doi]
- An IP Traceback Technique against Denial-of-Service AttacksZhaole Chen, Moon-Chuen Lee. 96-105 [doi]
- Forum Session: Security for Wireless Sensor NetworksDavid Carman, Daniel Coffin, Bruno Dutertre, Vipin Swarup, Ronald J. Watro. 106-109 [doi]
- An Intrusion-Tolerant Password Authentication SystemXunhua Wang, Mohammad Hossain Heydari, Hua Lin. 110-118 [doi]
- Modeling of Multiple Agent based Cryptographic Key Recovery ProtocolShinyoung Lim, Sangseung Kang, Joo-Chan Sohn. 119-128 [doi]
- Practical Random Number Generation in SoftwareJohn Viega. 129-141 [doi]
- Multi-Version Attack Recovery for Workflow SystemMeng Yu, Peng Liu, Wanyu Zang. 142-151 [doi]
- Automatic Reassembly of Document Fragments via Context Based Statistical ModelsKulesh Shanmugasundaram, Nasir D. Memon. 152-159 [doi]
- Automated Analysis for Digital Forensic Science: Semantic Integrity CheckingTye Stallard, Karl N. Levitt. 160-169 [doi]
- Honeypots: Catching the Insider ThreatLance Spitzner. 170-181 [doi]
- Isolated Program Execution: An Application Transparent Approach for Executing Untrusted ProgramsZhenkai Liang, V. N. Venkatakrishnan, R. Sekar. 182-191 [doi]
- How to unwittingly sign non-repudiable documents with Java applicationsDanilo Bruschi, D. Fabris, V. Glave, Emilia Rosti. 192-196 [doi]
- Making Secure TCP Connections Resistant to Server FailuresHailin Wu, Andrew Burt, Ramki Thurimella. 197-207 [doi]
- PSOS RevisitedPeter G. Neumann, Richard J. Feiertag. 208-216 [doi]
- A Failure to Learn from the PastEugene H. Spafford. 217-233 [doi]
- Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDSYu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi. 234-244 [doi]
- Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDSNathan Carey, George M. Mohay, Andrew Clark. 245-254 [doi]
- Log Correlation for Intrusion Detection: A Proof of ConceptCristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe. 255-265 [doi]
- Protecting Personal Data: Can IT Security Management Standards Help?Giovanni Iachello. 266-275 [doi]
- An Editor for Adaptive XML-Based Policy Management of IPsecRaj Mohan, Timothy E. Levin, Cynthia E. Irvine. 276-285 [doi]
- Security Design in Online GamesJeff Jianxin Yan. 286-297 [doi]
- Security Analysis of the SAML Single Sign-on Browser/Artifact ProfileThomas Groß. 298-307 [doi]
- Scalable and Efficient PKI for Inter-Organizational CommunicationArne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson. 308-318 [doi]
- A Policy Validation Framework for Enterprise Authorization SpecificationRamaswamy Chandramouli. 319-329 [doi]
- Themes and Highlights of the New Security Paradigms Workshop 2003O. Sami Saydjari, Carla Marceau. 330-333 [doi]
- Goalkeeper: Close-In Interface ProtectionStephen D. Wolthusen. 334-341 [doi]
- Poly2 Paradigm: A Secure Network Service ArchitectureEric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost. 342-351 [doi]
- Defending Embedded Systems Against Buffer Overflow via Hardware/SoftwareZili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean Sha. 352-363 [doi]
- Experimenting with a Policy-Based HIDS Based on an Information Flow Control ModelJacob Zimmermann, Ludovic Mé, Christophe Bidan. 364-373 [doi]
- An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection SystemsDarren Mutz, Giovanni Vigna, Richard A. Kemmerer. 374-383 [doi]
- Synthesizing Test Data for Fraud Detection SystemsEmilie Lundin Barse, Håkan Kvarnström, Erland Jonsson. 384-395 [doi]
- Differential Data Protection for Dynamic Distributed ApplicationPatrick Widener, Karsten Schwan, Fabián E. Bustamante. 396-405 [doi]
- Usable Access Control for the World Wide WebDirk Balfanz. 406-415 [doi]
- Modelling Contexts in the Or-BAC ModelFrédéric Cuppens, Alexandre Miège. 416-427 [doi]
- Miracle Cures and Toner Cartridges: Finding Solutions to the Spam ProblemMichael Clifford, Daniel Faigin, Matt Bishop, Tasneem Brutch. 428-429 [doi]