The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "DIMVA"( http://dblp.L3S.de/Venues/DIMVA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/dimva

Publication years (Num. hits)
2004 (15) 2005 (15) 2006-2007 (27) 2008 (15) 2009-2010 (27) 2011-2012 (28) 2013-2014 (29) 2015 (18) 2016 (22) 2017 (19) 2018 (19) 2019 (24) 2020-2021 (34) 2022-2023 (26)
Publication types (Num. hits)
inproceedings(298) proceedings(20)
Venues (Conferences, Journals, ...)
DIMVA(318)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 50 occurrences of 39 keywords

Results
Found 318 publication records. Showing 318 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Patrick Stewin, Iurii Bystrov Understanding DMA Malware. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Johannes Hoffmann, Sebastian Uellenbeck, Thorsten Holz SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thomas Schreck, Stefan Berger, Jan Göbel BISSAM: Automatic Vulnerability Identification of Office Documents. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu Using File Relationships in Malware Classification. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Min Zheng, Patrick P. C. Lee, John C. S. Lui ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gregor Maier, Anja Feldmann, Vern Paxson, Robin Sommer, Matthias Vallentin An Assessment of Overt Malicious Activity Manifest in Residential Networks. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thorsten Holz, Herbert Bos (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alexandros Kapravelos, Marco Cova, Christopher Kruegel, Giovanni Vigna Escape from Monkey Island: Evading High-Interaction Honeyclients. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Su Zhang, Xinming Ou, John Homer Effective Network Vulnerability Assessment through Model Abstraction. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Danesh Irani, Marco Balduzzi, Davide Balzarotti, Engin Kirda, Calton Pu Reverse Social Engineering Attacks in Online Social Networks. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Brad Miller, Paul Pearce, Chris Grier, Christian Kreibich, Vern Paxson What's Clicking What? Techniques and Innovations of Today's Clickbots. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin, Davide Balzarotti Operating System Interface Obfuscation and the Revealing of Hidden Operations. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Malek Ben Salem 0001, Salvatore J. Stolfo Decoy Document Deployment for Effective Masquerade Attack Detection. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin Johns, Sebastian Lekies Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requests. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sebastiano Di Paola, Dario Lombardo Protecting against DNS Reflection Attacks with Bloom Filters. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chuan Yue Mitigating Cross-Site Form History Spamming Attacks with Domain-Based Ranking. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter 0001 Code Pointer Masking: Hardening Applications against Code Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ge Zhang 0001, Simone Fischer-Hübner Timing Attacks on PIN Input in VoIP Networks (Short Paper). Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, Ludovico Cavedon, Marco Cova, Manuel Egele, Giovanni Vigna Organizing Large Scale Hacking Competitions. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jingyu Hua, Kouichi Sakurai Modeling and Containment of Search Worms Targeting Web Applications. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi Conqueror: Tamper-Proof Code Execution on Legacy Systems. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee Evaluating Bluetooth as a Medium for Botnet Command and Control. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Antonio Nappa, Aristide Fattori, Marco Balduzzi, Matteo Dell'Amico, Lorenzo Cavallaro Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hanli Ren, Natalia Stakhanova, Ali A. Ghorbani 0001 An Online Adaptive Approach to Alert Correlation. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nick Nikiforakis, Yves Younan, Wouter Joosen HProxy: Client-Side Detection of SSL Stripping Attacks. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hanno Fallmann, Gilbert Wondracek, Christian Platzer Covertly Probing Underground Economy Marketplaces. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Heng Yin 0001, Pongsin Poosankam, Steve Hanna, Dawn Xiaodong Song HookScout: Proactive Binary-Centric Hook Detection. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sasa Mrdovic, Branislava Perunicic-Drazenovic KIDS - Keyed Intrusion Detection System. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Adam Doupé, Marco Cova, Giovanni Vigna Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christian Kreibich, Marko Jahnke (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti, Ulrich Bayer dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Application fingerprinting, traffic deanonymization, machine learning, malware detection
1Makoto Shimamura, Kenji Kono Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Network-level code emulation, Memory-scanning attack, Intrusion detection, Code-injection attack, Intrusion analysis
1Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious script, shellcode, emulation, Drive-by download
1Jan Göbel, Thorsten Holz, Philipp Trinius Towards Proactive Spam Filtering (Extended Abstract). Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christian Bockermann, Martin Apel, Michael Meier 0001 Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract). Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chaoting Xuan, John A. Copeland, Raheem A. Beyah Shepherding Loadable Kernel Modules through On-demand Emulation. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor
1François Gagnon, Frédéric Massicotte, Babak Esfandiari Using Contextual Information for IDS Alarm Classification (Extended Abstract). Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ulrich Flegel, Danilo Bruschi (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zhiqiang Lin, Ryan D. Riley, Dongyan Xu Polymorphing Software by Randomizing Data Structure Layout. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jin Han, Debin Gao, Robert H. Deng On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero Selecting and Improving System Call Models for Anomaly Detection. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF System Call Models, Self Organizing Map, Anomaly Detection, Stochastic Models, Deterministic Models
1Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni How Good Are Malware Detectors at Remediating Infected Systems?. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software testing, Malware, malware detection
1Nizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka A Service Dependency Modeling Framework for Policy-Based Response Enforcement. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Youngsang Shin, Steven A. Myers, Minaxi Gupta A Case Study on Asprox Infection Dynamics. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Asprox, Security, Malware, SQL Injection
1Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov Learning and Classification of Malware Behavior. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan Expanding Malware Defense by Securing Software Installations. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Untrusted code, Software installation, Malicious code, Sandboxing
1Prithvi Bisht, V. N. Venkatakrishnan XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Attack Prevention, Security, Filtering, Cross-site scripting (XSS)
1Roberto Paleari, Davide Marrone, Danilo Bruschi, Mattia Monga On Race Vulnerabilities in Web Applications. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Van-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary The Quest for Multi-headed Worms. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Carrie Gates, John McHugh The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq Embedded Malware Detection Using Markov n-Grams. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Lorenzo Cavallaro, Prateek Saxena, R. Sekar 0001 On the Limits of Information Flow Techniques for Malware Analysis and Containment. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Diego Zamboni (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, Danilo Bruschi FluXOR: Detecting and Monitoring Fast-Flux Service Networks. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sandeep Bhatkar, R. Sekar 0001 Data Space Randomization. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF address space randomization, buffer overflow, memory error
1Ting-Fang Yen, Michael K. Reiter Traffic Aggregation for Malware Detection. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Najwa Aaraj, Anand Raghunathan, Niraj K. Jha Dynamic Binary Instrumentation-Based Framework for Malware Defense. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF control-data flow, execution context, dynamic binary instrumentation, virtualization, Malware
1Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Krzysztof M. Brzezinski Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract). Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel On the Effectiveness of Techniques to Detect Phishing Sites. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Eric Medvet, Alberto Bartoli On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan Extensible Web Browser Security. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Martin Johns, Justus Winter Protecting the Intranet Against "JavaScript Malware" and Related Attacks. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Bernhard M. Hämmerli, Robin Sommer (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis A Study of Malcode-Bearing Documents. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sandbox Diversity, Intrusion Detection, N-gram
1Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song Distributed Evasive Scan Techniques and Countermeasures. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF scan detection, distributed scanning, information-hiding, evasion
1Jon Oberheide, Manish Karir, Zhuoqing Morley Mao Characterizing Dark DNS Behavior. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF darknets, sensors, honeypots, DNS, reconnaissance
1Jan Goebel, Thorsten Holz, Carsten Willems Measurement and Analysis of Autonomous Spreading Malware in a University Environment. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malware, Honeypots, Invasive Software
1David R. Piegdon, Lexi Pimenidis Targeting Physically Addressable Memory. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Bojan Zdrnja, Nevil Brownlee, Duane Wessels Passive Monitoring of DNS Anomalies. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Elizabeth Stinson, John C. Mitchell Characterizing Bots' Remote Control Behavior. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Arno Wagner, Thomas Dübendorfer, Roman Hiestand, Christoph Göldi, Bernhard Plattner A Fast Worm Scan Detection Tool for VPN Congestion Avoidance. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bro, detection, worm, Scan, gateway, VPN
1Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Konrad Rieck, Pavel Laskov Detecting Unknown Network Attacks Using Language Models. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Marko Jahnke, Jens Tölle, Sascha Lettgen, Michael Bussmann, Uwe Weddige A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz 0001, Karl N. Levitt, Matt Bishop Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Liangwen Chen, Masayoshi Aritsugi An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Danilo Bruschi, Lorenzo Martignoni, Mattia Monga Detecting Self-mutating Malware Using Control-Flow Graph Matching. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel Using Static Program Analysis to Aid Intrusion Detection. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos Network-Level Polymorphic Shellcode Detection Using Emulation. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens Using Contextual Security Policies for Threat Response. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Roland Büschkes, Pavel Laskov (eds.) Detection of Intrusions and Malware & Vulnerability Assessment, Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Suraiya Khan, Issa Traoré A Prevention Model for Algorithmic Complexity Attacks. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Klaus Julisch, Christopher Krügel (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ulf Larson, Emilie Lundin Barse, Erland Jonsson METAL - A Tool for Extracting Attack Manifestations. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Automated attack analysis, log data, intrusion detection, system calls
1Mario Latendresse Masquerade Detection via Customized Grammars. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Udo Payer, Peter Teufl, Mario Lamberger Hybrid Engine for Polymorphic Shellcode Detection. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF polymorphic shellcode detection, neural networks, Intrusion Detection
1Fabien Pouget, Thorsten Holz A Pointillist Approach for Comparing Honeypots. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Seung-Sun Hong, Fiona Wong, Shyhtsun Felix Wu, Bjorn Lilja, Tony Y. Yohansson, Henric Johnson, Ame Nelsson TCPtransform: Property-Oriented TCP Traffic Transformation. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Fredrik Valeur, Darren Mutz, Giovanni Vigna A Learning-Based Approach to the Detection of SQL Attacks. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Meier 0001, Sebastian Schmerl, Hartmut König Improving the Efficiency of Misuse Detection. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Johannes Kinder, Stefan Katzenbeisser 0001, Christian Schallhart, Helmut Veith Detecting Malicious Code by Model Checking. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Model Checking, Malware Detection
Displaying result #201 - #300 of 318 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license