Default Cover Image

Internet Monitoring and Protection, International Conference on

June 29 2008 to July 5 2008

ISBN: 978-0-7695-3189-2

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-vii
VOC Based Key Quality Indicators for High-Speed Internet ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 53-58
Peer-to-Peer Networks SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 74-79
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
PrefaceFreely available from IEEE.pp. viii
Papers
CommitteesFreely available from IEEE.pp. ix-xiv
Papers
Dynamic Verification and Control of Mobile Peer-to-Peer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
HIDDEN: Hausdorff Distance Based Intrusion Detection Approach DEdicated to NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 11-16
Papers
Mouse Trapping: A Flow Data Reduction MethodFull-text access may be available. Sign in or learn about subscription options.pp. 17-22
Papers
Large-Scale Video Surveillance Systems: New Performance Parameters and MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 23-30
Efficient Security Measurements and Metrics for Risk AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 131-138
Papers
Impact of Traffic Mix and Packet Sampling on Anomaly VisibilityFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
Papers
Traffic Anomaly Detection at Fine Time Scales with Bayes NetsFull-text access may be available. Sign in or learn about subscription options.pp. 37-46
Papers
Towards a User-Centric Identity-Usage Monitoring SystemFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
An Evaluation of Major Image Search Engines on Various Query TopicsFull-text access may be available. Sign in or learn about subscription options.pp. 161-165
Papers
Specification-Based Denial-of-Service Detection for SIP Voice-over-IP NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 59-66
Papers
Zombie Identification PortFull-text access may be available. Sign in or learn about subscription options.pp. 67-73
Identity Management in Mobile Ubiquitous EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 178-183
Papers
A Threat-Aware Signature Based Intrusion-Detection Approach for Obtaining Network-Specific Useful AlarmsFull-text access may be available. Sign in or learn about subscription options.pp. 80-85
Papers
Towards Fast Detecting Intrusions: Using Key Attributes of Network TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 86-91
[Publisher's information]Freely available from IEEE.pp. 186-186
Papers
Cryptographic Authentication on the Communication from an 8051 Based Development Board over UDPFull-text access may be available. Sign in or learn about subscription options.pp. 92-97
Papers
NIVSS: A Nearly Indestructible Video Surveillance SystemFull-text access may be available. Sign in or learn about subscription options.pp. 98-102
Papers
An Empirical Study on Data Center System Failure DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Papers
A Dangerousness-Based Investigation Model for Security Event ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 109-118
Papers
A Merge Method for Decentralized Discrete-Event Fault DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 119-124
Papers
A Holistic, Collaborative, Knowledge-Sharing Approach for Information Security Risk ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 125-130
Papers
An Access Service Scheme with Anonymity for Ubiquitous Computing Based on Mobile IPv6Full-text access may be available. Sign in or learn about subscription options.pp. 139-144
Papers
Establishing a Secure Peer Identity Association Using IMS ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 145-151
Papers
A Near Real-Time System for Security Assurance AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 152-160
Papers
A Classification of Security Feedback Design Patterns for Interactive Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 166-171
Papers
An Empirical Analysis of RS SteganalysisFull-text access may be available. Sign in or learn about subscription options.pp. 172-177
Papers
Author IndexFreely available from IEEE.pp. 185
Showing 35 out of 35