Default Cover Image

Third IEEE International Workshop on Information Assurance (IWIA'05)

Mar. 23 2005 to Mar. 24 2005

College Park, Maryland

ISBN: 0-7695-2317-X

Table of Contents

Introduction
Message from the Workshop ChairsFreely available from IEEE.pp. vii
Introduction
Message from the EditorsFreely available from IEEE.pp. vii
Malware Defense
A Methodology for Designing Countermeasures against Current and Future Code Injection AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 3-20
Combining static analysis and dynamic learning to build accurate intrusion detection modelsFull-text access may be available. Sign in or learn about subscription options.pp. 164-177
Malware Defense
Making the Kernel Responsible: A New Approach to Detecting & Preventing Buffer OverflowsFull-text access may be available. Sign in or learn about subscription options.pp. 21-32
Malware Defense
Evaluation of Worm Containment Algorithms and Their Effect on Legitimate TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 33-42
Malware Defense
Malware Defense Using Network Security AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 43-54
MANET Security
A General Cooperative Intrusion Detection Architecture for MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 57-70
MANET Security
SAWAN: A Survivable Architecture for Wireless LANsFull-text access may be available. Sign in or learn about subscription options.pp. 71-82
Intrusion Detection I
Meta IDS Environments: An Event Message Anomaly Detection ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 85-94
Intrusion Detection I
An Alert Fusion Framework for Situation Awareness of Coordinated Multistage AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 95-104
Intrusion Detection I
Stellar: A Fusion System for Scenario Construction and Security Risk AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 105-116
Modeling and Policies
Attack-Potential-Based Survivability Modeling for High-Consequence SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 119-130
Modeling and Policies
Enforcing Messaging Security PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 131-138
Intrusion Detection II
The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 141-153
Intrusion Detection II
Forensic Analysis of File System Intrusions Using Improved BacktrackingFull-text access may be available. Sign in or learn about subscription options.pp. 154-163
Intrusion Detection II
Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 164-177
Showing 19 out of 19