NSPW C

16 papers

YearTitle / Authors
2000A new paradigm hidden in steganography.
Ira S. Moskowitz, Garth E. Longdon, Liwu Chang
2000A requires/provides model for computer attacks.
Steven J. Templeton, Karl E. Levitt
2000Adversary work factor as a metric for information assurance.
Gregg Schudel, Bradley Wood
2000Attack net penetration testing.
James P. McDermott
2000Characterizing the behavior of a program using multiple-length N-grams.
Carla Marceau
2000Conduit cascades and secure synchronization.
Simon N. Foley
2000Disarming offense to facilitate defense.
Danilo Bruschi, Emilia Rosti
2000Dynamic analysis of security protocols.
Alec Yasinsac
2000Incentives to help stop floods.
Clifford E. Kahn
2000Multilateral security a concept and examples for balanced security.
Kai Rannenberg
2000Natural language processing for information assurance and security: an overview and implementations.
Mikhail J. Atallah, Craig J. McDonough, Victor Raskin, Sergei Nirenburg
2000Network traffic tracking systems: folly in the large?
Thomas E. Daniels, Eugene H. Spafford
2000New paradigms in incident management.
Tom Perrine, Abe Singer
2000Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000
Mary Ellen Zurko, Steven J. Greenwald
2000Quality of security service.
Cynthia E. Irvine, Timothy E. Levin
2000Reflections on ratings.
Kenneth G. Olthoff