The Center for Education and Research in Information Assurance and Security (CERIAS)
The Center for Education and Research in
Information Assurance and Security (CERIAS)
Menu
Search CERIAS
Go
HOME
(current)
ABOUT
About CERIAS
Public Relations Materials & Info
Travel Information
Frequently Asked Questions
Organizational Primer (PDF)
History
PEOPLE
Faculty & Research Staff
Student List
Staff
PhD Graduates
Awards
All People
PARTNERS
Strategic Partners
External Advisory Board
Donors
Purdue Campus Partners
All Partners
SEMINARS
NEWS & BLOGS
RESEARCH
EDUCATION
RESOURCES
STUDENTS
SYMPOSIUM
Search CERIAS
Go
Home
>
Reports and Papers Archive
>
Reports and Papers Archive
Search:
Type:
Type
article
book
booklet
collection
conference
inbook
incollection
inproceedings
manual
mastersthesis
misc
patent
phdthesis
proceedings
techreport
unpublished
Browse All Papers »
Submit A Paper »
‹ First
<
211
212
213
>
Last ›
Practical Uses of Synchronized Clocks in Distributed Systems
Barbara Liskov
Added 2002-07-26
Anomaly Detection: Purpose and Framework
G. E. Liepens,H. S. Vaccaro
Added 2002-07-26
Discussion on Ph.D. thesis proposals in computing science
H. C. Lauer
Added 2002-07-26
Codes, Keys and Conflicts: Issues in U.S.Crypto Policy
Susan Landau,Stephen Kent,Clint Brooks,Scott Charney,Dorothy Denning,Whitfield Duffie,Anthony Lauck,Doug Miller,Peter Neumann,David Sobel
Added 2002-07-26
The Assault on 114, 381, 625, 757, 888, 867, 669, 235, 779, 976, 146, 612, 010, 218, 296, 721,242, 362, 562, 561, 842, 935, 706, 935, 245, 7333, 897, 830, 597, 123, 563, 958, 705, 058, 989, 075, 147, 599, 290, 026, 879, 543, 541
Gina Kolata
Added 2002-07-26
The Spring Virtual Memory System
Yousef A. Khalidi,Michael N. Nelson
Added 2002-07-26
A Case for Runtime Code Generation
David Keppel,Susan J. Eggers,Robert R. Henry
Added 2002-07-26
Directed-Graph Epidemiological Models of Computer Viruses
Jeffrey O. Kephart,Steve R. White
Added 2002-07-26
The SRI IDES Statistical Anomaly Detector
Harold S. Javitz,Alfonso Valdes
Added 2002-07-26
The NIDES Statistical Component Description and Justification
Harold S. Javitz,Alfoso Valdes
Added 2002-07-26
USTAT A Real-time Intrusion Detection System for UNIX
Koral Ilgun
Added 2002-07-26
An Experimental Approach to Statistical Mutation-Based Testing
William Hsu,Mehmet Sahinoglu,Eugene Spafford
Added 2002-07-26
Packets Found on an Internet
Steven M. Bellovin
Added 2002-07-26
Security Concerns for IPng
S. Bellovin
Added 2002-07-26
Cryptography: Trends in Technology and Policy
Lance J. Hoffman,Steven L. Heckler,Ann Huybrechts
Added 2002-07-26
‹ First
<
211
212
213
>
Last ›