掌桥科研
一站式科研服务平台
科技查新
收录引用
专题文献检索
外文数据库(机构版)
更多产品
首页
成为会员
我要充值
退出
我的积分:
中文会员
开通
中文文献批量获取
外文会员
开通
外文文献批量获取
我的订单
会员中心
我的包量
我的余额
登录/注册
文献导航
中文期刊
>
中文会议
>
中文学位
>
中国专利
>
外文期刊
>
外文会议
>
外文学位
>
外国专利
>
外文OA文献
>
外文科技报告
>
中文图书
>
外文图书
>
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
美国国防部AD报告
美国能源部DE报告
美国航空航天局NASA报告
美国商务部PB报告
外军国防科技报告
美国国防部
美国参联会主席指示
美国海军
美国空军
美国陆军
美国海军陆战队
美国国防技术信息中心(DTIC)
美军标
美国航空航天局(NASA)
战略与国际研究中心
美国国土安全数字图书馆
美国科学研究出版社
兰德公司
美国政府问责局
香港科技大学图书馆
美国海军研究生院图书馆
OALIB数据库
在线学术档案数据库
数字空间系统
剑桥大学机构知识库
欧洲核子研究中心机构库
美国密西根大学论文库
美国政府出版局(GPO)
加利福尼亚大学数字图书馆
美国国家学术出版社
美国国防大学出版社
美国能源部文献库
美国国防高级研究计划局
美国陆军协会
美国陆军研究实验室
英国空军
美国国家科学基金会
美国战略与国际研究中心-导弹威胁网
美国科学与国际安全研究所
法国国际关系战略研究院
法国国际关系研究所
国际宇航联合会
美国防务日报
国会研究处
美国海运司令部
北约
盟军快速反应部队
北约浅水行动卓越中心
北约盟军地面部队司令部
北约通信信息局
北约稳定政策卓越中心
美国国会研究服务处
美国国防预算办公室
美国陆军技术手册
一般OA
科技期刊论文
科技会议论文
图书
科技报告
科技专著
标准
其它
美国卫生研究院文献
分子生物学
神经科学
药学
外科
临床神经病学
肿瘤学
细胞生物学
遗传学
公共卫生&环境&职业病
应用微生物学
全科医学
免疫学
动物学
精神病学
兽医学
心血管
放射&核医学&医学影像学
儿科
医学进展
微生物学
护理学
生物学
牙科&口腔外科
毒理学
生理学
医院管理
妇产科学
病理学
生化技术
胃肠&肝脏病学
运动科学
心理学
营养学
血液学
泌尿科学&肾病学
生物医学工程
感染病
生物物理学
矫形
外周血管病
药物化学
皮肤病学
康复学
眼科学
行为科学
呼吸学
进化生物学
老年医学
耳鼻喉科学
发育生物学
寄生虫学
病毒学
医学实验室检查技术
生殖生物学
风湿病学
麻醉学
危重病护理
生物材料
移植
医学情报
其他学科
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
主题
主题
题名
作者
关键词
摘要
高级搜索 >
外文期刊
外文会议
外文学位
外国专利
外文图书
外文OA文献
中文期刊
中文会议
中文学位
中国专利
中文图书
外文科技报告
清除
历史搜索
清空历史
首页
>
外文会议
>
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
召开年:
2004
召开地:
出版时间:
-
会议文集:
-
会议论文
热门论文
全部论文
全选(
0
)
清除
导出
1.
Adding the fourth 'R' CERT's model for computer security strategies
机译:
添加第四个“ R” 计算机安全策略的CERT模型
作者:
Endicott-Popovsky B.
;
Frincke D.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
authorisation;
message authentication;
computer crime;
security attack;
CERT Coordination Center;
computer security arms race;
PKI;
VPN;
firewall;
intrusion system;
hacker arms race;
CERT computer security model;
2.
Attack attribution in non-cooperative networks
机译:
非合作网络中的攻击归因
作者:
Cohen D.
;
Narayanaswamy K.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
authorisation;
IP networks;
packet switching;
telecommunication network routing;
attack attribution tracking;
noncooperative network;
3.
CLIQUE clustering approach to detect denial-of-service attacks
机译:
CLIQUE群集方法可检测拒绝服务攻击
作者:
Bethi S.K.
;
Phoha V.V.
;
Reddy Y.B.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
data mining;
very large databases;
pattern clustering;
CLIQUE clustering approach;
denial-of-service attack detection;
DoS attack;
grid-based clustering;
density-based clustering;
network traffic data;
large databases;
data mining;
4.
Designing an information security system
机译:
设计信息安全系统
作者:
Resch C.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
information systems;
systems analysis;
formal specification;
information security system design;
information system security engineering;
requirements generation;
5.
GSWLAN: a new architecture model for a generic and secure wireless LAN system
机译:
GSWLAN:用于通用且安全的无线LAN系统的新架构模型
作者:
Virendra M.
;
Upadhyaya S.
;
Wang X.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
wireless LAN;
security of data;
data integrity;
quality of service;
GSWLAN architecture;
wireless LAN system;
WLAN security scheme;
information integrity;
quality of service;
network health maintenance;
6.
IP-traceback based attacker tracking: a probabilistic technique for detecting Internet attacks using the concept of hidden Markov models
机译:
基于IP跟踪的攻击者跟踪:一种使用隐马尔可夫模型概念检测Internet攻击的概率技术
作者:
Raviteja Varanasi
;
Phoha V.V.
;
Shrijit Joshi
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
IP networks;
Internet;
authorisation;
hidden Markov models;
probability;
packet switching;
IP-traceback;
attacker tracking;
probabilistic packet marking scheme;
Internet attack detection;
hidden Markov model;
denial-of-service detection;
distributed denial-of-service attack detection;
7.
Iterative incentive scheme for outsourced IA
机译:
外包IA的迭代激励方案
作者:
Schmitzt E.
;
Pinto C.A.
;
Ashish Arora
;
Rahul Telang
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
outsourcing;
contracts;
incentive schemes;
intranets;
security of data;
iterative incentive scheme;
information assurance outsourcing;
IT infrastructure;
outsourcing contract;
Navy Marine Corps Intranet;
service level agreement;
homeland security;
8.
Markov chains in network intrusion detection
机译:
网络入侵检测中的马尔可夫链
作者:
Hixon R.
;
Gruenbacher D.M.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
authorisation;
Markov processes;
packet switching;
computer networks;
transport protocols;
Markov chain;
network intrusion detection;
computer security attack;
intrusion detection system;
network packets;
TCP/IP header fields;
9.
Towards a trusted immutable kernel extension (TIKE) for self-healing systems: a virtual machine approach
机译:
迈向自我修复系统的可信不可变内核扩展(TIKE):虚拟机方法
作者:
Grizzard J.B.
;
Dodson E.R.
;
Conti G.J.
;
Levine J.G.
;
Owen H.L.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
operating system kernels;
virtual machines;
authorisation;
system recovery;
trusted immutable kernel extension;
self-healing system;
virtual machine approach;
host operating system;
intrusion detection system;
10.
A biometric authentication approach for high security ad-hoc networks
机译:
高安全性自组织网络的生物特征认证方法
作者:
Xiao Q.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
message authentication;
ad hoc networks;
peer-to-peer computing;
biometrics (access control);
mobile communication;
telecommunication security;
military communication;
wireless LAN;
wireless technology;
mobile devices;
ad-hoc networks;
peer-to-peer network;
mobile communication;
biometric authentication model;
information security;
11.
Agent based multiple level dynamic multimedia security system
机译:
基于代理的多级动态多媒体安全系统
作者:
Hongwei Li
;
Dhawan A.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
multimedia systems;
security of data;
software agents;
multiple level dynamic multimedia security system;
software agent technology;
multiple security level technology;
data redundancy;
cryptography;
stenography;
12.
Anomaly intrusion detection using one class SVM
机译:
使用一类SVM进行异常入侵检测
作者:
Wang Y.
;
Wong J.
;
Miner A.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
support vector machines;
operating system kernels;
unsupervised learning;
anomaly intrusion detection;
kernel method;
statistical learning;
unsupervised learning;
one-class support vector machine;
13.
Application of a methodology to characterize rootkits retrieved from honeynets
机译:
应用方法论表征从蜜网中检索到的Rootkit
作者:
Levine J.
;
Grizzard J.
;
Owen H.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
network operating systems;
security of data;
computer system;
Georgia Tech Honeynet;
system administrators;
security instances;
digital signature;
14.
Context-based adaptive control in autonomous systems
机译:
自治系统中基于上下文的自适应控制
作者:
Choudhary A.R.
;
Odubiyi J.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
meta data;
formal specification;
decision support systems;
context specification;
adaptive control;
autonomous systems;
intrusion management system;
autonomous battlefield theater;
decision support mechanism;
operations control mechanism;
intrusion detection;
15.
Developing forensic computing tools and techniques within a holistic framework: an Australian approach
机译:
在整体框架内开发取证计算工具和技术:澳大利亚的方法
作者:
Slay J.
;
Hannan M.
;
Broucek V.
;
Turner P.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
computer crime;
Internet;
police data processing;
forensic computing;
Australia;
intelligence investigator;
cyber-policing;
e-crime;
cyber-terrorism;
online computer misuse detection;
16.
Enhanced secure dynamic DNS update with indirect route
机译:
通过间接路由增强了安全的动态DNS更新
作者:
Wilkinson D.
;
Chow C.E.
;
Cai Y.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
Internet;
client-server systems;
network servers;
telecommunication network routing;
telecommunication security;
performance evaluation;
Internet;
proxy server;
DNS server;
domain name system;
DDoS attack;
IR DNS update;
indirect route;
Secure Collective Defense system;
network security;
17.
Honeyfiles: deceptive files for intrusion detection
机译:
Honeyfiles:用于入侵检测的欺骗性文件
作者:
Yuill J.
;
Zappe M.
;
Denning D.
;
Feer F.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
file servers;
intrusion detection;
honeyfiles;
file server;
computer security;
deceptive files;
18.
Matrix based asymmetric bulk encryption algorithm
机译:
基于矩阵的非对称批量加密算法
作者:
Mukesh Kumar Singh
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
public key cryptography;
matrix algebra;
asymmetric bulk encryption algorithm;
public key encryption algorithm;
cryptography;
hash function;
security;
matrix algebra;
19.
NoSEBrEaK - attacking honeynets
机译:
NoSEBrEaK-攻击蜜网
作者:
Dornseif M.
;
Holz T.
;
Klein C.N.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
system monitoring;
honeynets;
system monitoring;
data security;
20.
Public key cryptography with matrices
机译:
带矩阵的公钥加密
作者:
Mukesh Kumar Singh
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
public key cryptography;
matrix multiplication;
computational complexity;
digital signatures;
public key cryptography;
circulant matrix multiplication;
commutative ring;
trapdoor function;
key agreement algorithm;
public key encryption algorithm;
security;
multivariate quadratic equation;
digital signature;
21.
Security feature comparison for fibre channel storage area networks switches
机译:
光纤通道存储区域网络交换机的安全功能比较
作者:
DeCusatis C.
;
Atkins R.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
metropolitan area networks;
storage area networks;
wavelength division multiplexing;
optical fibre networks;
telecommunication security;
security of data;
mainframes;
telecommunication channels;
business continuity;
intrusion detection;
fibre channel fabric switches;
optical storage area networks;
mainframe servers;
multiterabyte storage;
metropolitan area network;
MAN;
wavelength division multiplexing;
22.
Security in software architecture: a case study
机译:
软件体系结构中的安全性:一个案例研究
作者:
Sachitano A.
;
Chapman R.O.
;
Hamilton J.A.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
software architecture;
software maintenance;
security of data;
Internet;
formal specification;
software reliability;
software reusability;
file servers;
software architecture security;
software maintainability;
software performance;
software reusability;
software reliability;
software development process;
security engineering;
Internet mail server software;
23.
Simplified Protocol Capture (SIMPCAP)
机译:
简化协议捕获(SIMPCAP)
作者:
Corley M.W.
;
Weir M.W.
;
Nelson K.
;
Karam A.J.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
software libraries;
open systems;
application program interfaces;
protocols;
client-server systems;
Simplified Packet Capture architecture;
protocol decoding system;
high-level library architecture;
application programming interface;
protocol demultiplexing;
intrusion detection;
client systems;
24.
The application of a low pass filter in anomaly network intrusion detection
机译:
低通滤波器在异常网络入侵检测中的应用
作者:
Jun Li
;
Manikopoulos C.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
telecommunication traffic;
low-pass filters;
telecommunication security;
performance evaluation;
statistical analysis;
computer networks;
security of data;
anomaly network intrusion detection system;
network traffic;
denial of service attack;
traffic engineering;
self-similar traffic;
low pass filters;
Savitzky-Golay filter;
MWA filter;
management information base;
25.
The Manuka project
机译:
麦卢卡项目
作者:
Endicott-Popovsky B.
;
Dittrich D.
;
Phillips A.
;
Frincke D.
;
Chavez J.
;
Gibbons W.J.
;
Nguyen D.
;
Seifert C.
;
Shephard A.
;
Abate C.
;
Loveland S.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
visual databases;
educational courses;
teaching;
cataloguing;
Manuka project;
cataloging;
system images;
Pacific Northwest Honeynet;
malicious network intrusion threats;
teaching;
incident response courses;
computer forensic courses;
26.
The Trusted Computing Exemplar project
机译:
可信计算范例项目
作者:
Irvine C.E.
;
Levin T.E.
;
Nguyen T.D.
;
Dinolt G.W.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
Trusted Computing Exemplar project;
knowledge transfer;
information assurance;
27.
A mechanism for automatic digital evidence collection on high-interaction honeypots
机译:
高交互蜜罐上自动数字证据收集的机制
作者:
Carbone M.d.P.A..
;
de Geus P.L.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
network operating systems;
automatic digital evidence collection;
high-interaction honeypots filesystem;
interceptor module;
28.
A secure logging scheme for Forensic Computing
机译:
取证计算的安全日志记录方案
作者:
Kawaguchi N.
;
Ueda S.
;
Obata N.
;
Miyaji R.
;
Kaneko S.
;
Shigeno H.
;
Okada K.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
authorisation;
digital signatures;
data integrity;
secure logging scheme;
Forensic Computing;
confidential information;
access control;
signature tree;
Forward Integrity;
29.
Advancing assurance for secure distributed communications
机译:
进一步保证安全的分布式通信
作者:
Bella G.
;
Bistarelli S.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
distributed processing;
computer networks;
protocols;
secure distributed communication;
information assurance;
protocols;
computer security;
30.
Analyzing the security and survivability of real-time control systems
机译:
分析实时控制系统的安全性和生存性
作者:
Oman P.
;
Krings A.
;
Conte de Leon D.
;
Alves-Foss J.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
real-time systems;
SCADA systems;
Internet;
graph theory;
security of data;
real-time control systems;
graph theoretical formulation;
five-step transformation;
electric power SCADA system;
graph algorithms;
security analysis;
cyber vulnerabilities;
critical infrastructure protection;
31.
Anomalous packet identification for network intrusion detection
机译:
用于网络入侵检测的异常数据包识别
作者:
Summerville D.H.
;
Nwanze N.
;
Skormin V.A.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
computer networks;
learning (artificial intelligence);
real-time systems;
telecommunication security;
anomaly detection system;
network intrusion detection;
high-bandwidth network;
network interface;
firewall;
network traffic;
bit-pattern hash function;
machine learning;
anomaly packet identification;
32.
Architecture of the reconnaissance intrusion detection system (RIDS)
机译:
侦察入侵检测系统(RIDS)的体系结构
作者:
Zheng Zhang
;
Manikopoulos C.N.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
system monitoring;
reconnaissance intrusion detection system;
session oriented statistical tool;
distributed stealthy reconnaissance attack;
anomaly detection;
alert correlation;
33.
Battery-based intrusion detection a first line of defense
机译:
基于电池的入侵检测是第一道防线
作者:
Jacoby G.A.
;
Marchany R.
;
Davis N.J. IV
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
intranets;
power consumption;
alarm systems;
wireless LAN;
mobile computing;
security of data;
monitoring;
defense early warning system;
corporate network;
battery-based intrusion detection;
mobile devices;
device power consumption;
rule-based host intrusion detection engine;
host analysis signature trace engine;
wireless security;
34.
Determining the strength of a decoy system: a paradox of deception and solicitation
机译:
确定诱饵系统的强度:欺骗和诱骗的悖论
作者:
Jordan C.J.
;
Zhang Q.
;
Roves J.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
system monitoring;
shallow decoy system;
Deception Toolkit;
Honeyd;
honeypots;
malicious software;
security;
35.
Developing and delivering hands-on information assurance exercises: experiences with the cyber defense lab at UMBC
机译:
开发和交付动手的信息保证练习:UMBC网络防御实验室的经验
作者:
Sherman A.T.
;
Roberts B.O.
;
Byrd W.E.
;
Baker M.R.
;
Simmons J.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
computer science education;
educational courses;
security of data;
ethical aspects;
buffer storage;
data privacy;
protocols;
human factors;
hands-on information assurance educational exercises;
UMBC undergraduate curricula;
buffer overflow attacks;
vulnerability scanning;
password security;
wired equivalent privacy protocol;
cyber defense lab;
computer security education;
36.
Dimension reduction using feature extraction methods for real-time misuse detection systems
机译:
使用特征提取方法减少尺寸的实时滥用检测系统
作者:
Kuchimanchi G.K.
;
Phoha V.V.
;
Balagani K.S.
;
Gaddam S.R.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
real-time systems;
neural nets;
pattern classification;
dimension reduction;
feature extraction;
real-time misuse detection system;
sensitivity mismatch measure;
specificity mismatch measure;
information gain;
neural network;
principal component analysis;
pattern classification;
37.
Dynamic document reclassification for preventing insider abuse
机译:
动态文档重新分类以防止内部人员滥用
作者:
Garg A.
;
Pramanik S.
;
Sankaranarayanan V.
;
Upadhyaya S.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
XML;
authorisation;
classification;
organisational aspects;
decision making;
digital document reclassification;
static secrecy levels;
document relative importance;
XML schemas;
digital rights management;
dynamic document categorization;
insider threat;
intrusion prevention;
policy management;
38.
Evolution of Inline Network Encryptors toward the High Assurance Internet Protocol Interoperability Specifications (HAIPIS)
机译:
嵌入式网络加密器向高度保证的互联网协议互操作性规范(HAIPIS)的演进
作者:
Widby J.B.
;
Rio R.D.D.
;
Fulton D.O.
;
Dunn C.C.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
cryptography;
transport protocols;
military computing;
military communication;
Internet;
High Assurance Internet Protocol Interoperability Specifications;
Inline Network Encryption devices;
information security;
military communication;
39.
Fuzzy dependency and its applications in damage assessment and recovery
机译:
模糊依赖及其在损伤评估与恢复中的应用
作者:
Yanjun Zuo
;
Panda B.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
relational databases;
fuzzy reasoning;
data integrity;
fuzzy dependency;
damage assessment;
damage recovery;
data organization;
database schema;
inference rule;
information attack;
data accuracy;
40.
Honeypot forensics
机译:
蜜罐取证
作者:
Raynal F.
;
Berthier Y.
;
Biondi P.
;
Kaminsky D.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
telecommunication security;
telecommunication traffic;
security of data;
honeypot forensics;
evidence gathering process;
egress network traffic;
network event;
system event;
fingerprint identification;
41.
Investigation of pushback based detection and prevention of network bandwidth attacks
机译:
基于推回式检测和防止网络带宽攻击的研究
作者:
Wu N.
;
Zhang J.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
telecommunication congestion control;
telecommunication security;
bandwidth allocation;
Internet;
packet switching;
quality of service;
telecommunication network routing;
invasive software;
pushback based detection;
network bandwidth attack;
packet dropping;
IP address;
Internet Worm Propagation simulator;
Internet CodeRed worm;
42.
Limitations of on demand secure routing protocols
机译:
按需安全路由协议的局限性
作者:
Prabha Ramachandran
;
Yasinsac A.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
routing protocols;
telecommunication security;
ad hoc networks;
mobile communication;
mobile computing;
secure routing protocols;
mobile ad hoc network;
dynamic source routing;
on-demand routing;
invisible node attack;
43.
Measuring IT security - a method based on common criteria's security functional requirements
机译:
衡量IT安全性-一种基于通用标准的安全功能要求的方法
作者:
Hunstad A.
;
Hallberg J.
;
Andersson R.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
data integrity;
distributed databases;
formal specification;
trustworthy information systems;
IT security;
Common Criteria security functional requirements;
distributed information systems;
44.
Misleading attackers with deception
机译:
欺骗者误导攻击者
作者:
Cohen F.
;
Koike D.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
telecommunication security;
computer crime;
information protection;
network attacks;
deception defenses;
45.
Modeling critical infrastructure requirements
机译:
为关键基础架构需求建模
作者:
Wolthusen S.D.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
graph theory;
optimisation;
critical infrastructure;
information sharing;
layered graph-theoretical modeling technique;
ontological model;
dependency model;
combinatorial optimization;
46.
On the security of random key pre-distribution schemes
机译:
关于随机密钥预分配方案的安全性
作者:
Ramkumar M.
;
Memon N.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
cryptography;
message authentication;
authorisation;
random key pre-distribution scheme;
security;
tamper-resistance hardware;
resource constrained nodes;
message authentication;
trusted authority;
47.
Overview of a high assurance architecture for distributed multilevel security
机译:
分布式多级安全性的高保证体系结构概述
作者:
Irvine C.E.
;
Levin T.E.
;
Nguyen T.D.
;
Shifflett D.
;
Khosalim J.
;
Clark P.C.
;
Wong A.
;
Afinidad F.
;
Bibighaus D.
;
Sears J.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
open systems;
telecommunication security;
computer crime;
high assurance architecture;
distributed multilevel security;
commodity client software;
legacy single level network;
handling routine information;
user acceptability;
48.
Protocol anomaly detection and verification
机译:
协议异常检测与验证
作者:
In Seon Yoo
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
transport protocols;
formal specification;
formal verification;
specification languages;
security of data;
protocol anomaly detection;
network traffic;
packet verifier;
packet inspection engine;
TCP transaction behaviour;
specification language;
description language;
formal verification;
formal specification;
49.
Qualitative and quantitative analytical techniques for network security assessment
机译:
网络安全评估的定性和定量分析技术
作者:
Clark K.
;
Tyree S.
;
Dawkins J.
;
Hale J.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
computer network management;
security of data;
telecommunication security;
risk analysis;
object-oriented methods;
multistage attack modeling framework;
risk-based network security management;
compound vulnerability analysis;
50.
Recursive data mining for masquerade detection and author identification
机译:
用于伪装检测和作者识别的递归数据挖掘
作者:
Szymanski B.K.
;
Zhang Y.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
authorisation;
digital signatures;
data mining;
recursive data mining method;
masquerade detection problem;
author identification;
cognition model;
computer security attack;
automata theory;
hidden Markov model;
Bayesian model;
matching algorithm;
bioinformatics;
user signature;
weighting prediction scheme;
intrusion detection;
51.
Secure communications in ad hoc networks
机译:
Ad hoc网络中的安全通信
作者:
Burmester M.
;
Van Le T.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
ad hoc networks;
mobile computing;
telecommunication security;
telecommunication channels;
routing protocols;
fault tolerance;
Bayes methods;
ad hoc networks;
mobile nodes;
secure communication channel;
Bayesian inferences;
secure communication protocol;
52.
SILT: integrated logging management for security-enhanced Linux
机译:
SILT:用于增强安全性的Linux的集成日志记录管理
作者:
Davis N.
;
Holloway P. II
;
Hale J.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
Linux;
authorisation;
operating system kernels;
logging management;
security-enhanced Linux;
mandatory access control protection scheme;
Unix;
command-line configuration;
graphical logging configuration;
53.
Tactical bandwidth exhaustion in ad hoc networks
机译:
Ad hoc网络中的战术带宽耗尽
作者:
Gu Q.
;
Liu P.
;
Chu C.-H.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
ad hoc networks;
authorisation;
routing protocols;
bandwidth allocation;
access protocols;
telecommunication congestion control;
telecommunication traffic;
military communication;
telecommunication security;
computer networks;
tactical bandwidth exhaustion;
ad hoc network;
denial of service;
media access control;
routing protocols;
IEEE 802.11 networks;
54.
Towards the specification of access control policies on multiple operating systems
机译:
迈向在多个操作系统上访问控制策略的规范
作者:
Teo L.
;
Ahn G.-J.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
authorisation;
Linux;
specification languages;
resource allocation;
access control policy specification languages;
UNIX operating system;
discretionary access control paradigm;
decentralized security policies;
SELinux;
Systrace;
55.
UML extensions for honeypots in the ISTS Distributed Honeypot Project
机译:
ISTS分布式蜜罐项目中蜜罐的UML扩展
作者:
Carella C.
;
Dike J.
;
Fox N.
;
Ryan M.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
Linux;
virtual machines;
Internet;
network operating systems;
distributed honeypot system;
Internet;
virtual machine technology;
Distributed Honeypot Project;
User-Mode Linux operating system;
UML extensions;
security;
56.
Forensics for advanced UNIX file systems
机译:
高级UNIX文件系统的取证
作者:
Eckstein K.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
Unix;
data structures;
meta data;
security of data;
advanced UNIX file system;
data structure;
digital forensic media analysis;
Linux;
file system meta-data;
57.
Mining data relationships for database damage assessment in a post information warfare scenario
机译:
在信息战后场景中挖掘数据关系以进行数据库损坏评估
作者:
Hu Y.
;
Panda B.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
data mining;
database management systems;
data structures;
security of data;
data mining;
database damage assessment;
post information warfare scenario;
cyber attack detection;
intrusion response team;
data structure;
database operation phase;
58.
A game theoretic approach to modeling intrusion detection in mobile ad hoc networks
机译:
在移动自组织网络中建模入侵检测的博弈论方法
作者:
Patcha A.
;
Park J.-M.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
ad hoc networks;
mobile computing;
telecommunication security;
game theory;
game theoretic approach;
intrusion detection;
mobile ad hoc networks;
third party authentication;
security architectures;
noncooperative game;
59.
Classification of computer attacks using a self-organizing map
机译:
使用自组织映射对计算机攻击进行分类
作者:
DeLooze L.L.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
authorisation;
computer crime;
self-organising feature maps;
computer attack classification;
self-organizing map;
computer crime;
MITRE Common Vulnerabilities and Exposure;
text description;
Kohonen map;
computer security;
taxonomy;
60.
An investigation of a compromised host on a honeynet being used to increase the security of a large enterprise network
机译:
对用于提高大型企业网络安全性的蜜网上受损主机的调查
作者:
Jackson T.R.
;
Levine J.G.
;
Grizzard J.B.
;
Owen H.L.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
authorisation;
virtual enterprises;
telecommunication security;
telecommunication traffic;
computer networks;
network intrusion;
large enterprise network;
firewall;
intrusion detection system;
production machine;
production traffic;
real production traffic;
61.
The new criteria for covert channels auditing
机译:
秘密渠道审核的新标准
作者:
Changda Wang
;
Shiguang Ju
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
security of data;
bandwidth allocation;
telecommunication channels;
telecommunication security;
covert channels auditing criteria;
security level span;
multilevel security system;
62.
Searching covert channels by identifying malicious subjects in the time domain
机译:
通过识别时域中的恶意主题来搜索秘密频道
作者:
Changda Wang
;
Shiguang Ju
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
time-varying channels;
computer networks;
security of data;
telecommunication security;
covert channel;
covert communication;
malicious subject identification;
time domain;
data security;
63.
Simulation for training computer network operations
机译:
模拟训练计算机网络操作
作者:
DeLooze L.L.
;
McKean P.
;
Mostow J.R.
;
Graig C.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
computer science education;
training;
Internet;
teaching;
courseware;
security of data;
computer network operation;
training;
computer security;
Internet Attack Simulator;
Network Simulator;
information assurance;
virtual network;
computer science student;
information technology professional;
network security;
64.
Windows NT one-class masquerade detection
机译:
Windows NT一类伪装检测
作者:
Li L.
;
Manikopoulos C.N.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
network operating systems;
learning (artificial intelligence);
support vector machines;
security of data;
Windows NT;
support vector machine;
SVM;
masquerade detection;
one-class training;
user profiling;
65.
Defending against traffic analysis attacks with link padding for bursty traffics
机译:
使用链接填充防御突发流量,以防御流量分析攻击
作者:
Yan W.
;
Hou E.
;
Ansari N.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
telecommunication traffic;
quality of service;
telecommunication links;
Internet;
telecommunication security;
principal component analysis;
traffic analysis attack;
link padding algorithm;
network administrator;
catastrophic distributed denial of services attack;
histogram feature vector method;
principle component analysis;
66.
LSB steganalysis using support vector regression
机译:
使用支持向量回归的LSB隐写分析
作者:
Lin E.
;
Woertz E.
;
Kam M.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
data encapsulation;
watermarking;
feature extraction;
regression analysis;
security of data;
support vector machines;
information detection;
least significant bit;
LSB;
image features;
support vector regression;
multidimensional feature space;
steganalysis;
67.
Network abuse detection via flow content characterization
机译:
通过流内容表征检测网络滥用
作者:
Kharrazi M.
;
Shanmugasundaram K.
;
Memon N.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
peer-to-peer computing;
authorisation;
resource allocation;
packet switching;
telecommunication traffic;
computer network management;
telecommunication security;
network abuse detection;
flow content characterization;
unauthorized applications;
peer-to-peer networks;
security policies;
68.
Who has the keys to the vault? Protecting secrets on Laptops
机译:
谁拥有金库的钥匙?保护笔记本电脑上的秘密
作者:
Armstrong H.
;
Wynne M.
;
OShea T.
会议名称:
《Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC》
|
2004年
关键词:
message authentication;
cryptography;
authorisation;
laptop computers;
laptop security;
security of data;
data encryption;
user authentication;
access control;
意见反馈
回到顶部
回到首页