The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Anomaly Detection: Purpose and Framework

G. E. Liepens,H. S. Vaccaro
Added 2002-07-26


Codes, Keys and Conflicts: Issues in U.S.Crypto Policy

Susan Landau,Stephen Kent,Clint Brooks,Scott Charney,Dorothy Denning,Whitfield Duffie,Anthony Lauck,Doug Miller,Peter Neumann,David Sobel
Added 2002-07-26


The Spring Virtual Memory System

Yousef A. Khalidi,Michael N. Nelson
Added 2002-07-26

A Case for Runtime Code Generation

David Keppel,Susan J. Eggers,Robert R. Henry
Added 2002-07-26

Directed-Graph Epidemiological Models of Computer Viruses

Jeffrey O. Kephart,Steve R. White
Added 2002-07-26

The SRI IDES Statistical Anomaly Detector

Harold S. Javitz,Alfonso Valdes
Added 2002-07-26

The NIDES Statistical Component Description and Justification

Harold S. Javitz,Alfoso Valdes
Added 2002-07-26


An Experimental Approach to Statistical Mutation-Based Testing

William Hsu,Mehmet Sahinoglu,Eugene Spafford
Added 2002-07-26

Packets Found on an Internet

Steven M. Bellovin
Added 2002-07-26

Security Concerns for IPng

S. Bellovin
Added 2002-07-26

Cryptography: Trends in Technology and Policy

Lance J. Hoffman,Steven L. Heckler,Ann Huybrechts
Added 2002-07-26