Abstract is missing.
- Packet Filtering for Congestion Control under DoS AttacksYen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi. 3-18 [doi]
- A Secure Wireless Agent-based TestbedGustave Anderson, Leonardo Urbano, Gaurav Naik, David Dorsey, Andrew Mroczkowski, Donovan Artz, Nicholas Morizio, Andrew Burnheimer, Kris Malfettone, Daniel Lapadat, Evan Sultanik, Saturnino Garcia, Maxim Peysakhov, William C. Regli, Moshe Kam. 19-32 [doi]
- Survivable Monitoring in Dynamic NetworksGiuseppe Ateniese, Chris Riley, Christian Scheideler. 33-47 [doi]
- A Systematic Approach to Multi-Stage Network Attack AnalysisJerald Dawkins, John Hale. 48-58 [doi]
- Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly DetectionJohn Zachary, John C. McEachen, Daniel W. Ettlich. 59-70 [doi]
- Methods for Cluster-Based Incident DetectionBrian D. Carrier, Blake Matheny. 71-78 [doi]
- A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy LogicGautam Singaraju, Lawrence Teo, Yuliang Zheng. 79-96 [doi]
- Protection against Indirect Overflow Attacks on PointersGe Zhu, Akhilesh Tyagi. 97-106 [doi]
- A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call TableJohn G. Levine, Julian B. Grizzard, Henry L. Owen. 107-128 [doi]
- Increased Information Flow Needs for High-Assurance Composite EvaluationsPaul A. Karger, Helmut Kurth. 129-140 [doi]
- A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic CoalitionsMujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu. 141-154 [doi]
- Defeating Internet Attacks Using Risk Awareness and Active HoneypotsLawrence Teo, Yu-An Sun, Gail-Joon Ahn. 155-168 [doi]