RSS feed Add to your Facebook page LinkedIn Watch us on Youtube
  
  
  
  
Access
  
MP-IST-041-$$ALL.pdf
  
Full Copy of Document11/1/2004Open Access
MP-IST-041-$$TOC.pdf
  
Table of Contents11/1/2004Open Access
MP-IST-041-$I1.pdf
  
Introduction (1)11/1/2004Open Access
MP-IST-041-$I2.pdf
  
Introduction (2)11/1/2004Open Access
MP-IST-041-$KN.pdf
  
Keynote Address - Designing and Implementing a Family of Intrusion Detection Systems11/1/2004Open Access
MP-IST-041-01.pdf
  
Paper 1 - Securing the Interaction between Unclassified Military Networks and Other Systems11/1/2004Open Access
MP-IST-041-02.pdf
  
Paper 2 - Dynamic Virtual LANs for Adaptive Network Security11/1/2004Open Access
MP-IST-041-03.pdf
  
Paper 3 - Virtual Machine Applicability to Dynamic Coalitions11/1/2004Open Access
MP-IST-041-04.pdf
  
Paper 4 - Components for Cooperative Intrusion Detection in Dynamic Coalition Environments11/1/2004Open Access
MP-IST-041-05.pdf
  
Paper 5 - Intrusion Tolerance for Unclassified Networked Systems11/1/2004Open Access
MP-IST-041-06.pdf
  
Paper 6 - Selecting Appropriate Counter-Measures in an Intrusion Detection Framework11/1/2004Open Access
MP-IST-041-07.pdf
  
Paper 7 - IRA – Intrusion - Réaction - Appâts11/1/2004Open Access
MP-IST-041-08.pdf
  
Paper 8 - Attack Processes Found on the Internet11/1/2004Open Access
MP-IST-041-09.pdf
  
Paper 9 - Development of Honeypot System Emulating Functions of Database Server11/1/2004Open Access
MP-IST-041-10.pdf
  
Paper 10 - Automated Anti-Virus Deployment11/1/2004Open Access
MP-IST-041-11.pdf
  
Paper 11 - Practical Protection for Public Servers11/1/2004Open Access
MP-IST-041-12.pdf
  
Paper 12 - Contracting out Governmental Web Services11/1/2004Open Access
MP-IST-041-13.pdf
  
Paper 13 - Network Vulnerability Assessment: A Multi-Layer Approach to Adaptivity11/1/2004Open Access
MP-IST-041-14.pdf
  
Paper 14 - Passive Network Discovery for Real Time Situation Awareness11/1/2004Open Access
MP-IST-041-15.pdf
  
Paper 15 - Monitoring of Network Topology Dynamics11/1/2004Open Access
MP-IST-041-16.pdf
  
Paper 16 - Information Exchange between Resilient and High-Threat Networks: Techniques for Threat Mitigation11/1/2004Open Access
MP-IST-041-17.pdf
  
Paper 17 - Tempering Network Stacks11/1/2004Open Access
MP-IST-041-18.pdf
  
Paper 18 - Resisting Traffic Analysis on Unclassified Networks11/1/2004Open Access
MP-IST-041-19.pdf
  
Paper 19 - A Policy Based Approach to Securing Egress Secure Socket Layer Connections on Local Area Networks11/1/2004Open Access
MP-IST-041-20.pdf
  
Paper 20 - Dealing with System Monocultures11/1/2004Open Access
MP-IST-041-21.pdf
  
Paper 21 - Building a Trusted Path for Applications using COTS Components11/1/2004Open Access