Abstract is missing.
- A Road Map to Becoming Security ConsciousJoe McCray. 1-9
- An Undergraduate Information Assurance CurriculumCharles Reynolds. 10-16
- A Virtual Environment for IA EducationDaniel Ragsdale, Scott D. Lathrop, Ronald Dodge. 17-23
- Non-Zero Sum Games and Survivable MalwareAdam Young. 24-29
- A Weakness in Smart Card PKI CertificationAdam Young. 30-34
- Methodology of Risk Assessment in Mobile Agent System DesignIngo McLean, Boleslaw K. Szymanski, Alan Bivens. 35-42
- Experiments with Deceptive Software Responses to Buffer-Based AttacksDonald P. Julian, Neil C. Rowe, James Bret Michael. 43-44
- Detecting Insider Threats by Monitoring System Call ActivityNam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning. 45-52
- Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic ParametersJun Li, Constantine N. Manikopoulos. 53-59
- How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing ProtocolsPeng Ning, Kun Sun. 60-67
- Wireless Intrusion Detection and ResponseYu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen. 68-75
- Wirless Security Threat TaxonomyDonald Welch, Scott Lathrop. 76-83
- Distributed Policy Processing in Virtual Private Operation Environment for Large Scale NetworksWei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao. 84-91
- The Use of Honeynets to Detect Exploited Systems Across Large Enterprise NetworksJohn G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver. 92-99
- Cyber Warfare PeacekeepingThomas P. Cahill, Konstantin Rozinov, Christopher Mulé. 100-107
- Factor Analysis Based Anomaly DetectionNingning Wu, Jing Zhang. 108-115
- Hidden Processes: The Implication for Intrusion DetectionJames Butler, Jeffrey Undercoffer, John Pinkston. 116-121
- Automatic Backdoor Analysis with Network Intrusion Detection System and Integrated Service CheckerJukka Juslin, Teemupekka Virtanen. 122-126
- Separating Trojan Horses from Viruses and Worms - A Proposed Taxonomy of Software WeaponsMartin Karresand. 127-134
- Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational ResiliencyNorka B. Lucena, Steve J. Chapin, Joohan Lee. 135-143
- Identification of IT Security-Relevant System CharacteristicsJonas Hallberg, Amund Hunstad, Anna Stjerneby. 143-150
- A Modest Proposal: Licencsing Personal Computers and Internet Service ProvidersClark Ray. 151-157
- Insecure Programming: How Culpable is a Language s Syntax?Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya. 158-163
- Security Vulnerabilities in Command and Control InteroperabilityJohn A. Hamilton Jr.. 164-169
- Accuracy Performance Analysis of Multimodal BiometricsS. K. Dahel, Q. Xiao Dominquez. 170-173
- Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access SecurityManish Gupta 0004, Shamik Banerjee, H. Raghav Rao, Shambhu J. Upadhyaya. 174-181
- Bridge Certification Authorities: Connecting B2B Public Key Infrastructure with PAK and Zero-Knowledge ProofGustavo A. Santana Torrellas, Torella Sarturo, Arturo Torres Dominquez. 182-187
- On Countermeasures to Traffic Analysis AttacksXinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao. 188-195
- An Architecture for Making Data Available Ceaselessly During RecoveryAmit Valsangkar, Brajendra Panda. 196-202
- Counterplanning Deceptions To Foil Cyber-Attack PlansNeil C. Rowe. 203-210
- Next Generation DDoS web based AttacksM. Sedano Reynolds. 211-215
- The Portable Educational Network (PEN)Lance J. Hoffman, Timothy Rosenberg, Steve Willmore. 217-220
- Counterplanning Deceptions to Foil Cyber Attack-PlansNeil C. Rowe. 221-228
- Risk Probability Estimating Based on ClusteringYong Chen, Christian Damsgaard Jensen, Jean-Marc Seigneur, Elizabeth Gray. 229-233
- A Design of Hardware Cryptographic Co-ProcessorFan Mingyu, Wang Jinahua, Wang Guangwe. 234-236
- A Cryptographic Protocol to Protect MPLS LabelsDavid A. Barlow, Vasos Vassiliou, Henry L. Owen. 237-242
- LLSIM: Network Simulation for Correlation and Response TestingJoshua W. Haines, Stephen A. Goulet, Robert S. Durst, Terrance G. Champion. 243-250
- An Evolutionary Approach to Generate Fuzzy Anomaly SignaturesFabio A. González, Jonatan Gómez, Madhavi Kaniganti, Dipankar Dasgupta. 251-259
- Security Assurance for an RBAC/MAC Security ModelCharles E. Phillips, Steven A. Demurjian, T. C. Ting. 260-267
- A Distributed Multipurpose Mail Guard (Blinded)Stephen D. Wolthusen. 268-275
- Secure Web-based Applications with XML and RBACCungang Yang, Chang N. Zhang. 276-281
- Information Assurance for Enterprise Fiber Optic NetworksCasimer M. DeCusatis. 282-287
- The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated ExecutionMario Baldi, Yoram Ofek, Moti Yung. 288-291
- Security-Auditing in a SoftswitchAbdur Rahim Choudhary. 292-293
- IEEE Information Assuurance ActivitiesJohn L. Cole. 294-295
- On the Large-Scale Deployment of a Distributed Embedded FirewallCharles N. Payne Jr., Dorene Kewley Ryder. 296-297
- Static Verification of Worm and virus Behavior in binary Executables using Model CheckingPrabhat K. Singh, Arun Lakhotia. 298-300
- The Kerf toolkit for intrusion analysisJaved A. Aslam, Sergey Bratus, David Kotz, Ronald A. Peterson, Daniela Rus, Brett Tofel. 301-302
- Costs and Benefits of Integrating Biometrics with a Navy Tactical Weapons SystemPerry Wilson, Bruce Shank. 303-304
- Army Reserve Information Operations Command OverviewDavid A. Yasenchock. 305
- Network Viruses: Their 306 Working Principles and Marriages with Hacking ProgramsYanjun Zuo, Brajendra Panda. 306-307