Abstract is missing.
- Attack net penetration testingJames P. McDermott. 15-21 [doi]
- Adversary work factor as a metric for information assuranceGregg Schudel, Bradley Wood. 23-30 [doi]
- A requires/provides model for computer attacksSteven J. Templeton, Karl E. Levitt. 31-38 [doi]
- A new paradigm hidden in steganographyIra S. Moskowitz, Garth E. Longdon, LiWu Chang. 41-50 [doi]
- Natural language processing for information assurance and security: an overview and implementationsMikhail J. Atallah, Craig J. McDonough, Victor Raskin, Sergei Nirenburg. 51-65 [doi]
- Disarming offense to facilitate defenseDanilo Bruschi, Emilia Rosti. 69-75 [doi]
- Dynamic analysis of security protocolsAlec Yasinsac. 77-87 [doi]
- Quality of security serviceCynthia E. Irvine, Timothy E. Levin. 91-99 [doi]
- Characterizing the behavior of a program using multiple-length N-gramsCarla Marceau. 101-110 [doi]
- Reflections on ratingsKenneth G. Olthoff. 111-116 [doi]
- Network traffic tracking systems: folly in the large?Thomas E. Daniels, Eugene H. Spafford. 119-124 [doi]
- Incentives to help stop floodsClifford E. Kahn. 127-132 [doi]
- New paradigms in incident managementTom Perrine, Abe Singer. 133-138 [doi]
- Conduit cascades and secure synchronizationSimon N. Foley. 141-150 [doi]
- Multilateral security a concept and examples for balanced securityKai Rannenberg. 151-162 [doi]