Sciweavers

14 search results - page 2 / 3
» iaw 2003
Sort
View
IAW
2003
IEEE
14 years 3 months ago
Risk Probability Estimating Based on Clustering
Yong Chen, Christian Damsgaard Jensen, Jean-Marc S...
IAW
2003
IEEE
14 years 3 months ago
The Kerf toolkit for intrusion analysis
Javed A. Aslam, Sergey Bratus, David Kotz, Ronald ...
IAW
2003
IEEE
14 years 3 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
IAW
2003
IEEE
14 years 3 months ago
Static Verification of Worm and virus Behavior in binary Executables using Model Checking
- Use offormal methods in any application scenario requires a precise characterization and representation of the properties that need to be verified The target, which is desired ri...
Prabhat K. Singh, Arun Lakhotia
IAW
2003
IEEE
14 years 3 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...