掌桥科研
一站式科研服务平台
科技查新
收录引用
专题文献代查
外文数据库(机构版)
更多产品
首页
成为会员
我要充值
退出
我的积分:
中文会员
开通
中文文献批量获取
外文会员
开通
外文文献批量获取
我的订单
会员中心
我的包量
我的余额
登录/注册
文献导航
中文期刊
>
中文会议
>
中文学位
>
中国专利
>
外文期刊
>
外文会议
>
外文学位
>
外国专利
>
外文OA文献
>
外文科技报告
>
中文图书
>
外文图书
>
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
美国国防部AD报告
美国能源部DE报告
美国航空航天局NASA报告
美国商务部PB报告
外军国防科技报告
美国国防部
美国参联会主席指示
美国海军
美国空军
美国陆军
美国海军陆战队
美国国防技术信息中心(DTIC)
美军标
美国航空航天局(NASA)
战略与国际研究中心
美国国土安全数字图书馆
美国科学研究出版社
兰德公司
美国政府问责局
香港科技大学图书馆
美国海军研究生院图书馆
OALIB数据库
在线学术档案数据库
数字空间系统
剑桥大学机构知识库
欧洲核子研究中心机构库
美国密西根大学论文库
美国政府出版局(GPO)
加利福尼亚大学数字图书馆
美国国家学术出版社
美国国防大学出版社
美国能源部文献库
美国国防高级研究计划局
美国陆军协会
美国陆军研究实验室
英国空军
美国国家科学基金会
美国战略与国际研究中心-导弹威胁网
美国科学与国际安全研究所
法国国际关系战略研究院
法国国际关系研究所
国际宇航联合会
美国防务日报
国会研究处
美国海运司令部
北约
盟军快速反应部队
北约浅水行动卓越中心
北约盟军地面部队司令部
北约通信信息局
北约稳定政策卓越中心
美国国会研究服务处
美国国防预算办公室
美国陆军技术手册
一般OA
科技期刊论文
科技会议论文
图书
科技报告
科技专著
标准
其它
美国卫生研究院文献
分子生物学
神经科学
药学
外科
临床神经病学
肿瘤学
细胞生物学
遗传学
公共卫生&环境&职业病
应用微生物学
全科医学
免疫学
动物学
精神病学
兽医学
心血管
放射&核医学&医学影像学
儿科
医学进展
微生物学
护理学
生物学
牙科&口腔外科
毒理学
生理学
医院管理
妇产科学
病理学
生化技术
胃肠&肝脏病学
运动科学
心理学
营养学
血液学
泌尿科学&肾病学
生物医学工程
感染病
生物物理学
矫形
外周血管病
药物化学
皮肤病学
康复学
眼科学
行为科学
呼吸学
进化生物学
老年医学
耳鼻喉科学
发育生物学
寄生虫学
病毒学
医学实验室检查技术
生殖生物学
风湿病学
麻醉学
危重病护理
生物材料
移植
医学情报
其他学科
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
主题
主题
题名
作者
关键词
摘要
高级搜索 >
外文期刊
外文会议
外文学位
外国专利
外文图书
外文OA文献
中文期刊
中文会议
中文学位
中国专利
中文图书
外文科技报告
清除
历史搜索
清空历史
首页
>
外文会议
>
其他
>
Man and Cybernetics Information Assurance Workshop
Man and Cybernetics Information Assurance Workshop
召开年:
召开地:
出版时间:
-
会议文集:
-
会议论文
热门论文
全部论文
全选(
0
)
清除
导出
1.
Inline network encryptors - enabling Internet protocol tunneling for securing data
机译:
内联网络加密器 - 启用Internet协议隧穿以保护数据
作者:
Dunn C. III
;
Widby J.B.
;
Watson S.
;
Del Rio R.R.
;
Fulton D.O.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
Internet;
cryptography;
military computing;
open systems;
transport protocols;
ATEC;
Army Test and Evaluation Command;
BCBL-G;
Battle Command Battle Laboratory-Gordon;
Internet protocol tunneling;
KG-175;
KG-235 Sectera FNE;
data security;
inline network encryptors;
i;
2.
Next generation SCADA security: best practices and client puzzles
机译:
下一代SCADA安全:最佳实践和客户端拼图
作者:
Bowen C.L. III
;
Buennemeyer T.K.
;
Thomas R.W.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
SCADA systems;
data structures;
public utilities;
security of data;
transport protocols;
SCADA security;
TCP;
data format;
end-to-end control;
information technology;
management;
monitoring;
network protocol;
networking industry;
public utility industry;
spatially sepa;
3.
The Honeynet quarantine: reducing collateral damage caused by early intrusion response
机译:
蜜网检疫:降低早期入侵响应造成的抵押品损坏
作者:
Toedtmann B.
;
Riebach S.
;
Rathgeb E.P.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
local area networks;
security of data;
virtual private networks;
Honeynet quarantine;
anomaly based intrusion detection;
collateral damage;
detection sensitivity;
early intrusion response;
link layer based VLAN;
production network;
usage restriction;
4.
Real-time identification of anomalous packet payloads for network intrusion detection
机译:
网络入侵检测的异常数据包有效载荷的实时识别
作者:
Nwanze N.
;
Summerville D.H.
;
Skormin V.A.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer networks;
cryptography;
grid computing;
learning (artificial intelligence);
packet switching;
pattern recognition;
telecommunication security;
telecommunication traffic;
2D grid;
DARPA;
anomalous packet payloads;
bit-pattern hash functions;
high-bandwidth n;
5.
Application of zeta function to quantum cryptography
机译:
Zeta函数在量子密码术中的应用
作者:
Xiangdong Li
;
Anshel M.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
arithmetic;
functions;
number theory;
quantum cryptography;
arithmetic theory;
one-way function;
quantum algorithms;
quantum cryptography;
zeta function;
6.
Malware examiner using disassembled code (MEDiC)
机译:
使用拆卸代码(MED)的恶意软件审查员
作者:
Sulaiman A.
;
Ramamoorthy K.
;
Mukkamala S.
;
Sung A.H.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
assembly language;
computer viruses;
program diagnostics;
MEDiC;
assembly language signature;
disassembled code;
malware detection;
malware examiner;
metamorphic malware;
mutant detection;
mutated malware;
obfuscation;
polymorphic malware;
sandbox testing;
signature e;
7.
Ad hoc network security: peer identification and authentication using signal properties
机译:
ad hoc网络安全:使用信号属性的对等识别和身份验证
作者:
Suen T.
;
Yasinsac A.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
ad hoc networks;
message authentication;
peer-to-peer computing;
radio transmitters;
telecommunication security;
ad hoc network security;
cooperative location scheme;
identity attack;
malicious alias attack;
masquerading attack;
message transmitter;
networking arch;
8.
Adopting eXtreme programming on a graduate student project
机译:
在研究生项目上采用极端编程
作者:
Endicott-Popovsky B.
;
Seifert C.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer science education;
continuing professional development;
educational courses;
programming;
software engineering;
teaching;
computer science;
eXtreme programming;
graduate student project;
learning;
pedagogy;
9.
Initial documentation requirements for a high assurance system: lessons learned
机译:
高保证系统的初始文档要求:学习的经验教训
作者:
Clark P.C.
;
Irvine C.E.
;
Levin T.E.
;
Nguyen T.D.
;
Shifflett D.J.
;
Miller D.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
security of data;
software performance evaluation;
system documentation;
documentation requirements;
high assurance system;
independent third-party evaluation;
product lifecycle;
software engineering;
standards;
trusted computing;
10.
Making garbage collection dependable through a run-time monitor
机译:
通过运行时间监视器可靠地制作垃圾收集
作者:
Chia-Tien Dan Lo
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
Java;
security of data;
storage management;
supervisory programs;
system monitoring;
Java security models;
anomalous program behavior detection;
data security;
fast death;
garbage collection;
heap memory attacks;
memory metrics;
metrics analysis;
metrics collection;
p;
11.
Pattern reduction and circuit design for hardware-supported network intrusion detection
机译:
用于硬件支持的网络入侵检测的图案减少和电路设计
作者:
Ramirez T.
;
Chia-Tien Dan Lo
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
logic design;
network synthesis;
packet switching;
pattern matching;
security of data;
NIDS Snort;
area utilization;
circuit design;
device constraint;
device utilization requirement;
hardware-supported network intrusion detection;
high-speed network monitoring;
pac;
12.
Anomaly intrusion detection based on biometrics
机译:
基于生物识别性的异常入侵检测
作者:
Ahmed A.A.E.
;
Traore I.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
biometrics (access control);
human computer interaction;
human factors;
security of data;
statistical analysis;
anomaly intrusion detection;
behavioral biometrics;
keystroke dynamics;
mouse dynamics;
statistical profiling;
user biological characteristics;
user prof;
13.
The digital signature paradox
机译:
数字签名悖论
作者:
Stapleton J.
;
Doyle P.
;
Esquire S.T.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
data integrity;
digital signatures;
fraud;
data integrity;
digital signature paradox;
fraud;
information falsification;
system clock;
time-sensitive digital signature;
trusted time stamp;
14.
IA risk assessment process
机译:
IA风险评估过程
作者:
Montry K.
;
Kelley R.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
information management;
risk management;
security of data;
information assurance requirement;
risk assessment process;
15.
Extending command and control infrastructures to cyber warfare assets
机译:
扩展指挥和控制基础设施到网络战争资产
作者:
Erbacher R.F.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
command and control systems;
electronic warfare;
military systems;
security of data;
cyber command and control infrastructure;
cyber information;
cyber resource;
cyber warfare;
military capability;
16.
MYSEA testbed
机译:
迈塞尔测试了
作者:
Nguyen T.D.
;
Levin T.E.
;
Irvine C.E.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
authorisation;
electronic data interchange;
information retrieval;
message authentication;
military computing;
MYSEA testbed;
Monterey security architecture;
artificial intelligence;
assurance authentication;
authorization;
flexible dynamic security policy;
informa;
17.
Designing security courses and lab for undergraduate and graduate students
机译:
设计本科和研究生的安全课程和实验室
作者:
Xiangdong Li
;
Anshel M.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer science education;
continuing education;
educational courses;
quantum cryptography;
CUNY;
City University of New York;
Graduate School and Center;
New York City College of Technology;
PhD programs;
graduate student;
information security course module;
mast;
18.
Anomaly detection based on performance data
机译:
基于性能数据的异常检测
作者:
Gokhale S.S.
;
Jijun Lu
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
Internet telephony;
security of data;
telecommunication security;
telecommunication traffic;
VoIP infrastructure;
anomaly detection;
performance data;
signaling performance;
voice-over-IP;
19.
A guarded cross-site mining architecture of systems security information
机译:
一种守卫的跨站点挖掘系统安全信息
作者:
Rajni Goel
;
Humphries J.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
data mining;
data privacy;
expert systems;
parallel processing;
pattern recognition;
security of data;
attack indication;
cross-site mining architecture;
data aggregation;
distributed computing;
expert systems;
information assurance;
intrusion indication;
parallel pr;
20.
Discovering multivariate linear relationship securely
机译:
安全地发现多变量线性关系
作者:
Ningning Wu
;
Jing Zhang
;
Li Ning
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
data mining;
data privacy;
distributed databases;
security of data;
very large databases;
PPC-LSE;
data mining;
data security;
distributed database;
factor analysis;
heterogeneous database;
large database;
multivariate linear relationship discovery;
privacy-preservin;
21.
Distribution of patches within vulnerable systems: a distributed model
机译:
弱势系统中的补丁分发:分布式模型
作者:
Sanjay Goel
;
Damira Pon
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
XML;
configuration management;
formal specification;
peer-to-peer computing;
security of data;
software maintenance;
specification languages;
P2P architecture;
P2P systems;
SPSML;
XML schema;
computer network;
distributed model;
patch installation;
peer-to-peer archit;
22.
Knowledge sharing honeynets
机译:
知识共享蜜币
作者:
Sudaharan S.
;
Dhammalapathi S.
;
Rai S.
;
Wijesekera D.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer networks;
real-time systems;
security of data;
active network monitoring;
attack strategy;
cooperating honeynets;
coordinated Internet attacks;
distributed Internet attacks;
event log analysis;
honeynet clusters;
intrusion detection systems;
knowledge shar;
23.
Incorporating vendor-based training into security courses
机译:
将基于供应商的培训纳入安全课程
作者:
Armstrong H.
;
Murray I.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
DP industry;
computer science education;
educational courses;
security of data;
Cisco FNS;
Cisco Fundamentals of Network Security;
Curtin University;
network security education;
security courses;
undergraduate degree programs;
vendor-based training;
24.
An e-mail honeypot addressing spammers' behavior in collecting and applying addresses
机译:
在收集和应用地址时解决垃圾邮件发送者行为的电子邮件蜜罐
作者:
Schryen G.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
Internet;
computer viruses;
unsolicited e-mail;
Internet;
address collection;
address harvesting;
e-mail address hiding;
e-mail honeypot;
spam honeypot project;
spammer behavior;
25.
Biometrics for massive access control - traditional problems and innovative approaches
机译:
大规模访问控制的生物识别 - 传统问题和创新方法
作者:
Riccardi L.
;
Peticone B.
;
Savastano M.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
biometrics (access control);
face recognition;
human factors;
military computing;
Italian Ministry of the Defense;
National Research Council of Italy;
access control;
application design;
authentication;
biometric identification;
biometric technique;
facial recognit;
26.
Net force maneuver - a JTF-GNO construct
机译:
净力量机动 - JTF-GNO构建
作者:
Hunt C.
;
Bowes J.R.
;
Gardner D.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
military computing;
security of data;
token networks;
JTF-GNO;
NAT;
attrition battle;
critical information;
defensive computer network strategy;
honeynet;
honeypot;
honeytokens;
information assurance;
military computer networks;
net force maneuver;
network address tra;
27.
Closing-the-loop: discovery and search in security visualizations
机译:
关闭 - 循环:发现和在安全可视化中搜索
作者:
Kiran Lakkaraju
;
Ratna Bearavolu
;
Slagell A.
;
Yurcik W.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer networks;
data visualisation;
pattern recognition;
security of data;
NVisionIP;
attack behavior;
closing-the-loop;
data pattern discovery;
network attack detection;
network data visualization;
network logs;
security engineers;
security visualizations;
28.
Software mediators for transparent channel control in unbounded environments
机译:
无限环境中透明通道控制的软件调解器
作者:
Hanebutte N.
;
Oman P.
;
Loosbrock M.
;
Holland A.
;
Harrison W.S.
;
Alves-Foss J.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
Internet;
Unix;
data integrity;
data privacy;
distributed object management;
grid computing;
operating system kernels;
telecommunication security;
transport protocols;
CORBA;
Internet;
MILS architecture;
Unix TCP/IP network;
communication security;
data isolation;
data;
29.
Security issues in biometric authentication
机译:
生物识别身份验证的安全问题
作者:
Qinghan Xiao
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
biometrics (access control);
message authentication;
access restriction;
biometric authentication;
data resources;
information system protection;
multimodal biometric fusion;
network security;
password;
person identity;
security threats;
spoofing attacks;
tokens;
use;
30.
User profiling using text classification
机译:
使用文本分类的用户分析
作者:
Carter P.H.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
behavioural sciences;
classification;
security of data;
text analysis;
Rocchio classifier;
computer forensics;
computer user behavior;
information assurance;
text classification;
text documents;
user profiling;
31.
Honeynet maintenance procedures and tools
机译:
核心维护程序和工具
作者:
Chaves C.H.P.C.
;
Franco L.H.
;
Montes A.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer network management;
data structures;
security of data;
standardisation;
data structure;
error elimination;
honeynet maintenance;
honeypot management;
standardization;
task automatization;
32.
A new on-line certificate validation method using LDAP component matching technology
机译:
使用LDAP组件匹配技术的新型在线证书验证方法
作者:
Jong Hyuk Choi
;
Sang Seok Lim
;
Zeilenga K.D.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
access protocols;
certification;
data structures;
message authentication;
open systems;
public key cryptography;
LDAP component matching;
LDAP search operation;
OCSP;
authenticated dictionary;
certificate revocation list;
certificate revocation tree;
data structure;
33.
Enterprise network security and extensions to Galois/counter mode encryption
机译:
企业网络安全和扩展到Galois / Counter Mode加密
作者:
DeCusatis C.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
Galois fields;
cryptography;
emergency services;
message authentication;
public administration;
standardisation;
storage area networks;
Galois/counter mode encryption;
authentication;
data encryption;
data-in-flight;
disaster recovery network;
enterprise network sec;
34.
Security risk metrics: fusing enterprise objectives and vulnerabilities
机译:
安全风险指标:融合企业目标和漏洞
作者:
Clark K.
;
Dawkins J.
;
Hale J.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
business data processing;
enterprise resource planning;
risk management;
security of data;
automated scanners;
enterprise objectives;
enterprise security metrics;
enterprise vulnerability;
mission tree;
network risk assessment;
risk exposure;
security risk metrics;
35.
Towards collaborative security and P2P intrusion detection
机译:
朝着协作安全和P2P入侵检测
作者:
Locasto M.E.
;
Parekh J.J.
;
Keromytis A.D.
;
Stolfo S.J.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
groupware;
invasive software;
peer-to-peer computing;
E2E information sharing;
Internet-scale threats;
P2P intrusion detection;
alert streams;
attacker behavior;
attacker intent;
bloom filters;
collaborative security;
decentralized P2P-style overlay network;
decentr;
36.
Evaluation of image compression algorithms for fingerprint and face recognition systems
机译:
指纹和面部识别系统的图像压缩算法评估
作者:
Funk W.
;
Arnold M.
;
Busch C.
;
Munde A.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
data compression;
face recognition;
fingerprint identification;
image coding;
vector quantisation;
visual databases;
BioCompress;
JPEG;
JPEG2000;
automatic fingerprint identification systems;
biometric algorithms;
digital fingerprint archive;
encoding;
face recogniti;
37.
Investigating performance and impacts on fingerprint recognition systems
机译:
调查对指纹识别系统的性能和影响
作者:
Arnold M.
;
Busch C.
;
Ihmor H.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
fingerprint identification;
pattern matching;
performance evaluation;
ID cards;
Visa application documents;
ageing effects;
biometric features;
biometric systems;
capability characteristics;
fingerprint recognition systems;
matching rate;
performance testing;
person;
38.
Community security awareness training
机译:
社区安全意识培训
作者:
Endicott-Popovsky B.
;
Orton I.
;
Bailey K.
;
Frincke D.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
Internet;
computer science education;
information systems;
search engines;
security of data;
standards;
training;
Google hacking contest;
NIST standards;
business community leadership;
community security awareness training;
information system;
online search engines;
39.
Survey: security in the system development life cycle
机译:
调查:系统开发生命周期的安全性
作者:
Amer S.H.
;
Humphries J.W.
;
Hamilton J.A. Jr.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
formal specification;
security of data;
software architecture;
systems analysis;
security architecture;
security attacks;
security controls;
security measures;
security policy;
security threats;
system development life cycle;
40.
Multispectral fingerprint biometrics
机译:
多光谱指纹生物识别
作者:
Rowe R.K.
;
Nixon K.A.
;
Corcoran S.P.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
feature extraction;
fingerprint identification;
image enhancement;
image matching;
image sensors;
fingerprint features;
fingerprint images;
minutiae detection;
minutiae matching;
multispectral fingerprint biometrics;
multispectral imager;
multispectral imaging;
opti;
41.
In the search of the 'gene of self-replication' in malicious codes
机译:
在搜索恶意代码中的“自我复制基因”
作者:
Skormin V.
;
Volynkin A.
;
Summerville D.
;
Moronski J.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
Internet;
computer viruses;
Internet;
computer epidemics;
computer programs;
computer worms;
gene mutation;
information attacks;
malicious codes;
self-replication;
unencrypted script-type computer viruses;
42.
Reverse code engineering: an in-depth analysis of the Bagle virus
机译:
反向代码工程:对百吉病毒的深入分析
作者:
Rozinov K.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer viruses;
program diagnostics;
reverse engineering;
system recovery;
Bagle virus;
FFSig;
RCE;
attack prevention;
computer virus detection;
functional flow;
reverse code engineering;
system recovery;
worm detection;
43.
Wireless security policy development for sensitive organizations
机译:
敏感组织的无线安全策略开发
作者:
Manley M.E.
;
McEntee C.A.
;
Molet A.M.
;
Park J.S.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
military computing;
security of data;
telecommunication security;
wireless LAN;
Department of Defense;
sensitive organizations;
wireless networks;
wireless security models;
wireless security policy development;
wireless technology;
44.
A log independent distributed database damage assessment model
机译:
日志独立分布式数据库损伤评估模型
作者:
Jing Zhou
;
Panda B.
;
Yi Hu
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
data structures;
distributed databases;
security of data;
transaction processing;
data damage;
data structures;
distributed database;
information attack;
log independent damage assessment model;
malicious transaction;
transaction relationship;
45.
A visualization paradigm for network intrusion detection
机译:
网络入侵检测的可视化范例
作者:
Yarden Livnat
;
Agutter J.
;
Moon S.
;
Erbacher R.F.
;
Foresti S.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer networks;
data visualisation;
security of data;
abnormal network activity detection;
alert temporal distribution;
attack trend;
attribute representation;
data visualization;
disparate logs;
many-to-one correlation;
network alert visual correlation;
network;
46.
Wireless provisioning in hostile RF environments
机译:
敌对RF环境中的无线配置
作者:
Kershaw M.
;
Keville K.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
access protocols;
authorisation;
radio access networks;
telecommunication network management;
telecommunication security;
transceivers;
wireless LAN;
Kismet;
SmartAP;
WAP design;
WLAN;
client access;
hostile RF environments;
multiple transceivers;
security;
transceiver;
47.
The response continuum
机译:
响应连续体
作者:
Caltagirone S.
;
Frincke D.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
security of data;
active response;
computer security;
detected threat mitigation;
response decision;
security defense system;
48.
CuPIDS enhances StUPIDS: exploring a co-processing paradigm shift in information system security
机译:
丘比特增强了愚蠢的:探索信息系统安全性的加工范式转变
作者:
Williams P.D.
;
Spafford E.H.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
coprocessors;
information systems;
security of data;
shared memory systems;
system monitoring;
CuPIDS project;
StUPIDS;
activity monitoring;
computational resource;
coprocessing intrusion detection system;
information system security;
shadow process;
shared resource;
49.
Towards a third generation data capture architecture for honeynets
机译:
迈向蜜月的第三代数据捕获架构
作者:
Balas E.
;
Viecco C.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer networks;
data models;
knowledge acquisition;
security of data;
canonical slow path;
computer network;
data access method;
data capture architecture;
data collection architecture;
data format;
data sources;
fast path;
honeynet data model;
honeynets;
honeypots;
50.
Learning classifiers for misuse and anomaly detection using a bag of system calls representation
机译:
使用一袋系统呼叫表示学习误用和异常检测的学习分类器
作者:
Dae-Ki Kang
;
Fuller D.
;
Honavar V.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer networks;
learning (artificial intelligence);
pattern classification;
pattern clustering;
security of data;
anomaly detection;
bag of system calls representation;
feature representation;
intrusion detection system;
intrusive behavior;
learning classifiers;
51.
Risk-based security engineering through the eyes of the adversary
机译:
通过对手的眼睛基于风险的安全工程
作者:
Evans S.
;
Wallner J.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
ad hoc networks;
decision theory;
risk analysis;
security of data;
software engineering;
systems engineering;
ad hoc process;
adversary model;
complex systems;
multicriterion decision model;
performance metrics;
risk analysis;
risk metric;
risk-based security enginee;
52.
Attacking automatic wireless network selection
机译:
攻击自动无线网络选择
作者:
Dai Zovi D.A.
;
Macaulay S.A.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
IEEE standards;
mobile computing;
network operating systems;
security of data;
telecommunication security;
wireless LAN;
MacOS X;
Windows XP;
automatic wireless network discovery;
automatic wireless network selection;
client operating systems;
network attack;
networ;
53.
Building compact exploitation graphs for a cluster computing environment
机译:
构建集群计算环境的紧凑型开发图
作者:
Wei Li
;
Vaughn R.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
graph theory;
risk management;
security of data;
workstation clusters;
abstraction techniques;
attack modeling;
attack scenarios;
e-graphs;
exploitation graphs;
exploitation similarity;
high-performance cluster computing;
host connection similarity;
network security;
54.
User requirements and design of a visualization for intrusion detection analysis
机译:
用于入侵检测分析的可视化的用户要求和设计
作者:
Goodall J.R.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer networks;
data visualisation;
formal specification;
security of data;
user centred design;
information visualization tool;
intrusion detection analysis;
network data;
network traffic;
user requirements;
user-centered design;
visualization display;
55.
Queue-based analysis of DoS attacks
机译:
基于队列的DOS攻击分析
作者:
Khan S.
;
Traore I.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
queueing theory;
security of data;
telecommunication security;
telecommunication switching;
Computer Security Institute;
DoS attacks;
FBI;
M/M/1/K queue;
attack detection metric;
complexity attacks;
computer attacks;
computer security;
denial of service attack;
flood;
56.
Fileprints: identifying file types by n-gram analysis
机译:
fileprints:通过n-gram分析识别文件类型
作者:
Wei-Jen Li
;
Ke Wang
;
Stolfo S.J.
;
Herzog B.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
category theory;
file organisation;
statistical analysis;
arbitrary file;
binary content;
buffering;
compact representation;
file analysis;
file categorization;
file disk streaming;
file type identification;
fileprint;
high bandwidth environment;
l-gram analysis;
n-gr;
57.
A comparison of system call feature representations for insider threat detection
机译:
内部威胁检测系统调用功能表示的比较
作者:
Liu A.
;
Martin C.
;
Hetherington T.
;
Matzner S.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
information systems;
security of data;
anomaly detection system;
external threat detection;
histograms;
information access;
information assurance;
information dissemination;
information systems;
insider threat detection;
intrusion detection system;
outlier detectio;
58.
Detecting honeypots and other suspicious environments
机译:
检测蜜罐和其他可疑环境
作者:
Holz T.
;
Raynal F.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer networks;
pattern recognition;
security of data;
IT security;
attack patterns;
attacker behavior;
computer networks;
debuggers;
electronic baits;
electronic decoys;
honeypot detection;
malicious attackers;
network resources;
security tools;
suspicious environ;
59.
Replication attack on random key pre-distribution schemes for wireless sensor networks
机译:
无线传感器网络随机键预分配方案的复制攻击
作者:
Huirong Fu
;
Kawamura S.
;
Ming Zhang
;
Liren Zhang
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
combinatorial mathematics;
cryptography;
statistics;
telecommunication security;
wireless sensor networks;
Blom-based scheme;
combinatorics;
cryptographic keys;
key information;
key management;
peplication attack;
q-composite scheme;
random key predistribution;
repli;
60.
Real-time and forensic network data analysis using animated and coordinated visualization
机译:
使用动画和协调可视化的实时和法医网络数据分析
作者:
Krasser S.
;
Conti G.
;
Grizzard J.
;
Gribschaw J.
;
Owen H.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer animation;
computer networks;
data analysis;
data visualisation;
pattern recognition;
real-time systems;
security of data;
telecommunication security;
2D coordinated display;
3D coordinated display;
analytic loop;
animated visualization;
anomaly detection;
c;
61.
MAC layer anomaly detection in ad hoc networks
机译:
Ad Hoc网络中的MAC层异常检测
作者:
Yu Liu
;
Yang Li
;
Hong Man
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
access protocols;
ad hoc networks;
mobile radio;
security of data;
telecommunication network routing;
telecommunication security;
telecommunication traffic;
MAC layer anomaly detection;
MAC layer traffic data;
WLAN;
ad hoc networks;
attack source localization;
behav;
62.
Toward a decentralized trust-based access control system for dynamic collaboration
机译:
朝着动态协作的分散基于信任的访问控制系统
作者:
Adams W.J.
;
Davis N.J. IV
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
ad hoc networks;
authorisation;
computer network management;
groupware;
mobile radio;
telecommunication security;
MANET;
ad hoc collaborative environment;
decentralized trust-based access control system;
distributed node-centric approach;
distributed operational e;
63.
Visualization techniques for intrusion behavior identification
机译:
用于入侵行为识别的可视化技术
作者:
Erbacher R.F.
;
Garber M.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
data visualisation;
security of data;
anomalous activity identification;
anomaly detection;
behavior analysis;
data visualization;
false negatives;
false positives;
host behavior;
intrusion behavior identification;
intrusion detection;
network behavior;
user behavio;
64.
A framework for system security assessment
机译:
系统安全评估的框架
作者:
Hallberg J.
;
Hunstad A.
;
Peterson M.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
information networks;
information systems;
security of data;
CAESAR method;
IT security;
information networks;
information systems;
scalar overall system security values;
security metrics;
system security assessment;
system structure;
system-dependent security valu;
65.
FABS: file and block surveillance system for determining anomalous disk accesses
机译:
Fabs:文件和阻止监控系统,用于确定异常磁盘访问
作者:
Stanton P.T.
;
Yurcik W.
;
Brumbaugh L.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
data mining;
data visualisation;
graphical user interfaces;
security of data;
software prototyping;
storage management;
system monitoring;
FABS;
VisFlowConnect-SS;
anomalous disk access;
attack damage minimization;
data access;
data deletion;
data disclosure;
data min;
66.
Host anomalies from network data
机译:
来自网络数据的主机异常
作者:
Gates C.
;
Becknel D.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer networks;
security of data;
telecommunication security;
telecommunication traffic;
activity change detection;
class B-sized network;
host anomaly;
network administrators;
network anomaly detection system;
network data;
network intrusion detection;
network;
67.
Safe renewal of a random key pre-distribution scheme for trusted devices
机译:
安全续订可信设备的随机密钥预分配方案
作者:
Ramkumar M.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
ad hoc networks;
cryptography;
data privacy;
message authentication;
mobile radio;
ubiquitous computing;
HARPS;
circuit-delay based authentication;
cooperative ad hoc networks;
device demands;
encryption;
hashed random preloaded subsets;
heterogeneous devices;
key re;
68.
Flow based observations from NETI@home and honeynet data
机译:
来自Neti @ Home和HoneyNet数据的流动的观察
作者:
Grizzard J.B.
;
Simpson C.R. Jr.
;
Krasser S.
;
Owen H.L.
;
Riley G.F.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
Internet;
invasive software;
packet switching;
telecommunication network routing;
telecommunication security;
telecommunication traffic;
transport protocols;
IP address;
Internet;
NETI@home data;
NETI@home traffic;
TCP flow;
TCP port activity;
computer worms;
cumulati;
69.
Virtual honeynets revisited
机译:
Virtual Honeynets重新审视
作者:
Lok Kwong Yan
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
Linux;
computer networks;
data handling;
network operating systems;
security of data;
virtual machines;
virtual private networks;
FSLog;
GenII honeynet;
Linux;
SELinux;
UML;
data control;
disk imager;
file system logging;
forensic images;
honeypot controller;
system call;
70.
DGKD: distributed group key distribution with authentication capability
机译:
DGKD:具有认证功能的分布式组密钥分布
作者:
Adusumilli P.
;
Xukai Zou
;
Ramamurthy B.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
cryptography;
groupware;
message authentication;
protocols;
telecommunication security;
DGKD protocol;
GKM protocols;
attack;
authentication;
centralized group key distribution;
decentralized group key management;
distributed group key distribution;
distributed/cont;
71.
A policy based architecture for NSA RAdAC model
机译:
NSA RADAC模型的基于策略架构
作者:
Rahim Choudhary
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
authorisation;
NSA RAdAC model;
policy based architecture;
role adaptive access control;
72.
A machine learning framework for network anomaly detection using SVM and GA
机译:
使用SVM和GA的网络异常检测机器学习框架
作者:
Taeshik Shon
;
Yongdae Kim
;
Cheolwon Lee
;
Jongsub Moon
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
genetic algorithms;
invasive software;
learning (artificial intelligence);
support vector machines;
DDos attack;
Dos attack;
Internet anomalies;
Internet attacks;
SVM;
computer security;
feature selection;
genetic algorithm;
intrusion detection;
machine learning;
netw;
73.
Wireless sensor network denial of sleep attack
机译:
无线传感器网络拒绝睡眠攻击
作者:
Brownfield M.
;
Yatharth Gupta
;
Davis N.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
IEEE standards;
access protocols;
authorisation;
computer networks;
telecommunication security;
wireless sensor networks;
IEEE 802.11 wireless network;
IEEE 802.3 wired network;
MAC protocol;
computer networks;
data collection;
data processing;
denial of sleep attac;
74.
Efficient log authentication for forensic computing
机译:
高效的日志身份验证用于法医计算
作者:
Kawaguchi N.
;
Obata N.
;
Ueda S.
;
Azuma Y.
;
Shigeno H.
;
Okada K.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer crime;
digital signatures;
law administration;
trees (mathematics);
digital evidence;
digital signatures;
distributed Merkle tree algorithm;
forensic computing;
log authentication;
logging host;
server traffic;
75.
Heavy tails and temporal correlations of processing times in network intrusion detection: characterization and consequences
机译:
网络入侵检测中处理时间的重型尾部和时间相关性:表征和后果
作者:
Cabrera J.B.D.
;
Lee W.
;
Gosar J.B.D.
;
Mehra R.K.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer networks;
packet switching;
pattern matching;
resource allocation;
security of data;
CPU;
content matching;
cumulative distribution function;
heavy tails;
memory allocation;
network intrusion detection system;
packet-to-packet time scale;
payload processing;
76.
Theoretical basis for intrusion detection
机译:
入侵检测的理论依据
作者:
Zhuowei Li
;
Das A.
;
Jianying Zhou
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
digital signatures;
feature extraction;
program diagnostics;
anomaly-based intrusion detection;
behavior model;
feature vector;
information security infrastructure;
model inaccuracy;
model incompleteness;
signature-based intrusion detection;
static analysis;
77.
Molehunt: near-line semantic activity tracing
机译:
molehunt:近线语义活动跟踪
作者:
Wolthusen S.D.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
data privacy;
operating systems (computers);
security of data;
Molehunt;
active security control;
anomalous activity detection;
classified data;
confidential data;
data access;
data protection;
intelligence analysis;
malicious activity detection;
malware;
near-line s;
78.
Visualizing network data for intrusion detection
机译:
可视化网络数据进行入侵检测
作者:
Kulsoom Abdullah
;
Lee C.
;
Conti G.
;
Copeland J.A.
会议名称:
《Man and Cybernetics Information Assurance Workshop》
|
2005年
关键词:
computer networks;
data visualisation;
graph theory;
invasive software;
IP address;
aggregate port activity;
forensic visualization;
graph;
histogram;
intrusion detection;
intrusion prevention;
malicious activity;
network activity;
network attacks;
network data visual;
意见反馈
回到顶部
回到首页