Abstract is missing.
- The LAIDS/LIDS Framework for Systematic IPS DesignSimon P. Chung, Aloysius K. Mok. 3-11 [doi]
- An Intelligent Detection and Response Strategy to False Positives and Network AttacksEmmanuel Hooper. 12-31 [doi]
- Active Event Correlation in Bro IDS to Detect Multi-stage AttacksBing Chen, Joohan Lee, Annie S. Wu. 32-50 [doi]
- Designing a Secure Point-of-Sale SystemAllan Pedersen, Anders Hedegaard, Robin Sharp. 51-65 [doi]
- High Robustness Requirements in a Common Criteria Protection ProfileThuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine. 66-78 [doi]
- Ensuring Compliance between Policies, Requirements and Software Design: A Case StudyQingfeng He, Paul N. Otto, Annie I. Antón, Laurie A. Jones. 79-92 [doi]
- A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk ManagementSuleyman Kondakci. 93-102 [doi]
- Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP NetworksNils Aschenbruck, Matthias Frank, Peter Martini, Jens Tölle, Roland Legat, Heinz-Dieter Richmann. 103-108 [doi]
- Jamming Commercial Satellite Communications During Wartime: An Empirical StudyHank Rausch. 109-118 [doi]
- An Application of Information Theory to Intrusion DetectionE. Earl Eiland, Lorie M. Liebrock. 119-134 [doi]
- HonIDS: Enhancing Honeypot System with Intrusion Detection ModelsYong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang. 135-143 [doi]
- POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection SystemDamiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon. 144-156 [doi]
- Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri NetsOle Martin Dahl, Stephen D. Wolthusen. 157-168 [doi]
- Factoring High Level Information Flow Specifications into Low Level Access ControlsKevin Kahley, Manigandan Radhakrishnan, Jon A. Solworth. 169-186 [doi]