PANEMOTO: network visualization of security situational awareness through passive analysis (Englisch)
- Neue Suche nach: Streilein, W.
- Neue Suche nach: Kratkiewicz, K.
- Neue Suche nach: Sikorski, M.
- Neue Suche nach: Piwowarski, K.
- Neue Suche nach: Webster, S.
- Neue Suche nach: Streilein, W.
- Neue Suche nach: Kratkiewicz, K.
- Neue Suche nach: Sikorski, M.
- Neue Suche nach: Piwowarski, K.
- Neue Suche nach: Webster, S.
In:
IEEE Workshop on Information Assurance, 2007
;
284-290
;
2007
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:PANEMOTO: network visualization of security situational awareness through passive analysis
-
Beteiligte:Streilein, W. ( Autor:in ) / Kratkiewicz, K. ( Autor:in ) / Sikorski, M. ( Autor:in ) / Piwowarski, K. ( Autor:in ) / Webster, S. ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE Operations Center
-
Erscheinungsort:Piscataway
-
Erscheinungsdatum:2007
-
Format / Umfang:7 Seiten, 20 Quellen
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Commentary| 2007
- 1
-
Table of Contents| 2007
- 1
-
Author index| 2007
- 1
-
Contributor Listings| 2007
- 1
-
A Global Look at AuthenticationHamilton, Stephen S. / Carlisle, Martin C. / Hamilton, John A. et al. | 2007
- 1
-
Breaker Pages| 2007
- 9
-
Recovering from Database Recovery: Case Studies and the Lessons They TeachHoferek, Mary J. / Wilson, Susan C. et al. | 2007
- 14
-
Do Word Clues Suffice in Detecting Spai and Phishing?Rowe, Neil C. / Barnes, David S. / McVicker, Michael / Egan, Melissa / Betancourt, Richard / Toledo, Rommel / Horner, Douglas P. / Davis, Duane T. / Guiterrez, Louis / Martell, Craig H. et al. | 2007
- 22
-
Experiences and lessons learned in the design and implementation of an Information Assurance curriculumMalladi, Sreekanth / El-Gayar, Omar / Streff, Kevin et al. | 2007
- 30
-
Mapping information security curricula to professional accreditation standardsArmstrong, Colin J. / Armstrong, Helen L. et al. | 2007
- 36
-
Evaluating an IA virtual network education programArmstrong, Helen L. / Jayaratna, Nimal / Dodge, Ronald C. et al. | 2007
- 43
-
Protocol of Secure Mutual AuthenticationMiloslavskaya, Natalia / Tolstoy, Alexander / Ushakov, Dmitriy et al. | 2007
- 49
-
Building Security into an IEEE FIPA Compliant Multiagent SystemOdubiyi, Jide B. / Choudhary, Abdur Rahim et al. | 2007
- 56
-
A Framework for Redacting Digital Information from Electronic DevicesManes, Gavin W. / Watson, Lance / Downing, Elizabeth / Barclay, Alex / Greer, David / Hale, John et al. | 2007
- 61
-
The Observability Calibration Test Development FrameworkEndicott-Ppovsky, Barbara E. / Frincke, Deborah A. et al. | 2007
- 67
-
Volleystore: A Parasitic Storage FrameworkRosenfeld, Kurt / Sencar, Husrev Taha / Memon, Nasir et al. | 2007
- 76
-
A Family of Efficient Key Predistribution Schemes for Pairwise AuthenticationRamkumar, Mahalingam et al. | 2007
- 84
-
Efficient Distribution of Trust Authority Functions in Tactical NetworksReidt, Steffen / Wolthusen, Stephen D. et al. | 2007
- 92
-
Detection of Virtual Environments and Low Interaction HoneypotsMukkamala, S. / Yendrapalli, K. / Basnet, R. / Shankarapani, M. K. / Sung, A. H. et al. | 2007
- 99
-
Improving Honeynet Data AnalysisViecco, Camilo et al. | 2007
- 107
-
Deception in Honeynets: A Game-Theoretic AnalysisGarg, Nandan / Grosu, Daniel et al. | 2007
- 114
-
TimeKeeper: A Metadata Archiving Method for Honeypot ForensicsFairbanks, Kevin D. / Lee, Christopher P. / Xia, Ying H. / Owen, Henry L. et al. | 2007
- 119
-
Stego Scrubbing A New Direction for Image SteganographyMoskowitz, Ira S. / Lafferty, Patricia A. / Ahmed, Farid et al. | 2007
- 127
-
Scalable, Cluster-based Anti-replay Protection for Wireless Sensor NetworksRaymond, David R. / Marchany, Randy C. / Midkiff, Scott F. et al. | 2007
- 135
-
Battery Polling and Trace Determination for Bluetooth Attack Detection in Mobile DevicesBuennemeyer, Timothy K. / Nelson, Theresa M. / Gora, Michael A. / Marchany, Randy C. / Tront, Joseph G. et al. | 2007
- 143
-
Keyless Jam ResistanceBaird, Leemon C. / Bahn, William L. / Collins, Michael D. / Carlisle, Martin C. / Butler, Sean C. et al. | 2007
- 151
-
Thwarting Cyber-Attack Reconnaissance with Inconsistency and DeceptionRowe, Neil C. / Goh, Han C. et al. | 2007
- 159
-
Rationale for and Capabilities of IT Security AssessmentHallberg, Niklas / Hallberg, Jonas / Hunstad, Amund et al. | 2007
- 167
-
Protecting Privacy Credentials from Phishing and Spyware AttacksPrice, Sean M. et al. | 2007
- 175
-
Preserving User Location Privacy Based on Web Queries and LBS ResponsesBowen, Calvert L. / Martin, Thomas L. et al. | 2007
- 183
-
Privacy Preserving Reputation Inquiry in a Peer-to-Peer Communication EnvironmentSy, Bon K. et al. | 2007
- 191
-
SWAP: Shared Wireless Access Protocol (using Reciprocity)Dunlop, Matthew W. / Pemg, Ginger / Andersen, David G. et al. | 2007
- 199
-
On the Effort to Create Smartphone Worms in Windows MobileBecher, Michael / Freiling, Felix C. / Leider, Boris et al. | 2007
- 207
-
Fuzzy Belief k-Nearest Neighbors Anomaly Detection of User to Root and Remote to Local AttacksChou, Te-Shun / Yen, Kang K. et al. | 2007
- 214
-
Arachne: Integrated Enterprise Security ManagementBurnside, Matthew / Keromytis, Angelos D. et al. | 2007
- 221
-
An Efficient Network Anomaly Detection Scheme Based on TCM-KNN Algorithm and Data Reduction MechanismLi, Yang / Guo, Li et al. | 2007
- 228
-
An Exploration on Security and Privacy Issues of Biometric Smart ID CardsXiao, Qinghan / Savastano, Mario et al. | 2007
- 234
-
An Elementary Electronc Voting Protocol Using RFIDLi, Xiangdong / Carlisle, Michael / Kwan, Andis C. / Leung, Lin / Enemuo, Amara / Anshel, Michael et al. | 2007
- 239
-
A Knowledge-Base Model for Insider Threat PredictionAlthebyan, Qutaibah / Panda, Brajendra et al. | 2007
- 247
-
Analysis and Statistical Properties of Critical Infrastructure Interdependency Multiflow ModelsSvendsen, Nils K. / Wolthusen, Stephen D. et al. | 2007
- 255
-
Identifying Image Spam based on Header and File Properties using C4.5 Decision Trees and Support Vector Machine LearningKrasser, Sven / Tang, Yuchun / Gould, Jeremy / Alperovitch, Dmitri / Judge, Paul et al. | 2007
- 262
-
Guiding Threat Analysis with Threat Source ModelsClark, K. / Lee, C. / Tyree, S. / Hale, J. et al. | 2007
- 270
-
GUI Usage Analysis for Masquerade DetectionImsand, Eric S / Hamilton, John A et al. | 2007
- 277
-
MSP-system: Mobile Secure Passport System to detect Malicious UsersTahara, Shinya / Kawaguchi, Nobutaka / Inaba, Taro / Shiozawa, Hidekazu / Shigeno, Hiroshi / Okada, Ken-ichi et al. | 2007
- 284
-
PANEMOTO: Network Visualization of Security Situational Awareness Through Passive AnalysisStreilein, William / Kratkiewicz, Kendra / Sikorski, Michael / Piwowarski, Keith / Webster, Seth et al. | 2007
- 291
-
Memoization Attacks and Copy Protection in Partitioned ApplicationsO'Donnell, Charles W. / Suh, G. Edward / van Dijk, Marten / Devadas, Srinivas et al. | 2007
- 302
-
H.264/AVC Stream Authentication at the Network Abstraction LayerUeda, Shintaro / Shinzaki, Yasutaka / Shigeno, Hiroshi / Okada, Ken-ichi et al. | 2007
- 309
-
A Linux Implementation of Temporal Access ControlsChiang, Ken / Nguyen, Thuy D. / Irvine, Cynthia E. et al. | 2007
- 317
-
Enhancing Internet Domain Name System Availability by Building Rings of Cooperation Among Cache ResolversPoolsappasit, Nayot / Ray, Indrajit et al. | 2007
- 325
-
Traffic Flow Confidentiality in a Future Network Enabled Capability EnvironmentHallingstad, Geir / Overlier, Lasse et al. | 2007
- 333
-
An Evaluation of Naïve Bayesian Anti-Spam Filtering TechniquesDeshpande, Vikas P. / Erbacher, Robert F. / Harris, Chris et al. | 2007
- 341
-
Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access TaintednessBellettini, Carlo / Rrushi, Julian L. et al. | 2007
- 349
-
Design and Use of a Secure Testing Environment on Untrusted HardwareCarlisle, Martin C. / Baird, Leemon C. et al. | 2007
- 355
-
Automated Retrieval of Security Statistics from the World Wide WebMcVicker, Michael / Avellino, Paul / Rowe, Neil C. et al. | 2007
- 357
-
Automated Tracing and Integration of Security Functionality via Requirements Taxonomies, Annotations and AspectsLlanso, Thomas / Barrett, George et al. | 2007