Attack net penetration testing (DOI)
J. P. McDermott
Adversary work factor as a metric for information assurance (DOI)
Gregg Schudel, Bradley Wood
A requires/provides model for computer attacks (DOI)
Steven J. Templeton, Karl Levitt
A new paradigm hidden in steganography (DOI)
Ira S. Moskowitz, Garth E. Longdon, LiWu Chang
Natural language processing for information assurance and security: an overview and implementations (DOI)
Mikhail J. Atallah, Craig J. McDonough, Victor Raskin, Sergei Nirenburg
Disarming offense to facilitate defense (DOI)
Danilo Bruschi, Emilia Rosti
Dynamic analysis of security protocols (DOI)
Alec Yasinsac
Quality of security service (DOI)
Cynthia Irvine, Timothy Levin
Characterizing the behavior of a program using multiple-length N-grams (DOI)
Carla Marceau
Reflections on ratings (DOI)
Kenneth G. Olthoff
Network traffic tracking systems: folly in the large? (DOI)
Thomas E. Daniels, Eugene H. Spafford
Incentives to help stop floods (DOI)
Clifford Kahn
New paradigms in incident management (DOI)
Tom Perrine, Abe Singer
Conduit cascades and secure synchronization (DOI)
Simon N. Foley
Multilateral security a concept and examples for balanced security (DOI)
Kai Rannenberg