


default search action
NSPW 2002: Virginia Beach, VA, USA
- Cristina Serban, Carla Marceau, Simon N. Foley:

Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002. ACM 2002, ISBN 1-58113-598-X
Intrusion detection and response
- Manasi Bhattacharyya, Shlomo Hershkop, Eleazar Eskin:

MET: an experimental system for Malicious Email Tracking. 3-10 - Hiroshi Toyoizumi, Atsuhi Kara:

Predators: good will mobile codes combat against computer viruses. 11-17 - Carol Taylor, Jim Alves-Foss:

An empirical analysis of NATE: Network Analysis of Anomalous Traffic Events. 18-26
Large systems
- Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux:

Small worlds in security systems: an analysis of the PGP certificate graph. 28-35 - Kay Connelly, Andrew A. Chien:

Breaking the barriers: high performance security for high performance computing. 36-42 - Paul Ashley, Calvin Powers, Matthias Schunter:

From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise. 43-50
Mobile code
- Hajime Inoue, Stephanie Forrest

:
Anomaly intrusion detection in dynamic execution environments. 52-60 - V. N. Venkatakrishnan, Ram Peri, R. Sekar:

Empowering mobile code using expressive security policies. 61-68 - Vivek Haldar, Christian H. Stork, Michael Franz:

The source is the proof. 69-73
Usability
- Paul Dourish, David F. Redmiles:

An approach to usable security based on event monitoring and visualization. 75-81 - Diana K. Smetters, Rebecca E. Grinter:

Moving from the design of usable security technologies to the design of useful secure applications. 82-89
Assurance in life/nation critical endeavors
- Steven J. Greenwald, Marv Schaefer:

Assurance in life/nation critical endeavors a panel. 91-96 - John Michael Williams:

Biometrics or ... biohazards? 97-107 - Carla Marceau:

An evolutionary approach to cyber security. 108-109 - Bob Blakley:

Assuring critical systems. 110-112
Securing information
- Ira S. Moskowitz, Liwu Chang, Richard E. Newman:

Capacity is the wrong paradigm. 114-126 - Wenliang Du, Justin Zhijun Zhan:

A practical approach to solve Secure Multi-party Computation problems. 127-135 - Mustaque Ahamad, Leo Mark, Wenke Lee, Edward Omicienski, Andre dos Santos, Ling Liu, Calton Pu:

Guarding the next Internet frontier: countering denial of information attacks. 136-143

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














