The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "RAID"( http://dblp.L3S.de/Venues/RAID )

URL (DBLP): http://dblp.uni-trier.de/db/conf/raid

Publication years (Num. hits)
2000-2002 (20) 2003-2004 (31) 2005 (17) 2006 (18) 2007 (18) 2008 (37) 2009 (34) 2010 (40) 2011 (21) 2012 (31) 2013 (23) 2014 (23) 2015 (29) 2016 (22) 2017 (22) 2018 (33) 2019 (38) 2020 (32) 2021 (33) 2022 (36) 2023 (51)
Publication types (Num. hits)
inproceedings(585) proceedings(24)
Venues (Conferences, Journals, ...)
RAID(609)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 222 occurrences of 140 keywords

Results
Found 609 publication records. Showing 609 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kevin S. Killourhy, Roy A. Maxion Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Martin Drasar, Jan Vykopal, Radek Krejcí, Pavel Celeda Aspect-Based Attack Detection in Large-Scale Networks. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kevin A. Roundy, Barton P. Miller Hybrid Analysis and Control of Malware. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro Live and Trustworthy Forensic Analysis of Commodity Production Systems. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Abhinav Srivastava, Jonathon T. Giffin Automatic Discovery of Parasitic Malware. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Giorgos Vasiliadis, Sotiris Ioannidis GrAVity: A Massively Parallel Antivirus Engine. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jianchun Jiang, Weifeng Chen 0001, Liping Ding On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken Community Epidemic Detection Using Time-Correlated Anomalies. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier An Analysis of Rogue AV Campaigns. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1FuYong Zhang, DeYu Qi 0001, JingLin Hu Using IRP for Malware Detection. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed A Distributed Honeynet at KFUPM: A Case Study. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kui Xu 0002, Qiang Ma 0006, Danfeng (Daphne) Yao Detecting the Onset of Infection for Secure Hosts. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam What Is the Impact of P2P Traffic on Anomaly Detection? Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yunjing Xu, Michael D. Bailey, Eric Vander Weele, Farnam Jahanian CANVuS: Context-Aware Network Vulnerability Scanning. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Serguei A. Mokhov, Joey Paquet, Mourad Debbabi Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ashish Kamra, Elisa Bertino Privilege States Based Access Control for Fine-Grained Intrusion Response. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Robert Koch 0002, Gabi Dreo Rodosek Security System for Encrypted Environments (S2E2). Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hosoi Takurou, Kanta Matsuura Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo 0001, Shambhu J. Upadhyaya A Data-Centric Approach to Insider Attack Detection in Database Systems. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shad Stafford, Jun Li 0001 Behavior-Based Worm Detectors Compared. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Teresa Pepe Detecting Network Anomalies in Backbone Networks. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Peng Li 0059, Limin Liu, Debin Gao, Michael K. Reiter On Challenges in Evaluating Malware Clustering. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Charles V. Wright, Christopher Connelly, Timothy M. Braje, Jesse C. Rabek, Lee M. Rossey, Robert K. Cunningham Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Salman Niksefat, Mohammad Mehdi Ahaniha, Babak Sadeghiyan, Mehdi Shajari Toward Specification-Based Intrusion Detection for Web Applications. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen Fast-Flux Bot Detection in Real Time. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo Bait Your Hook: A Novel Detection Technique for Keyloggers. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ryan Whelan, David R. Kaeli Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Luyi Xing, Yuqing Zhang, Shenlong Chen A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yipeng Wang 0001, Zhibin Zhang, Li Guo 0001 Inferring Protocol State Machine from Real-World Trace. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Somesh Jha, Robin Sommer, Christian Kreibich (eds.) Recent Advances in Intrusion Detection, 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor A Centralized Monitoring Infrastructure for Improving DNS Security. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jiang Wang 0008, Angelos Stavrou, Anup K. Ghosh HyperCheck: A Hardware-Assisted Integrity Monitor. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Thomas Guyet, Svein J. Knapskog Autonomic Intrusion Detection System. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Milosz Marian Hulboj, Ryszard Erazm Jurga CERN Investigation of Network Behaviour and Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, computer networks, network monitoring, packet sampling
1Lei Liu 0021, Guanhua Yan, Xinwen Zhang, Songqing Chen VirusMeter: Preventing Your Cellphone from Spies. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile malware, mobile device security, anomaly detection, power consumption
1Giorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis Regular Expression Matching on Graphics Hardware for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam On the Inefficient Use of Entropy for Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peng Li 0059, Debin Gao, Michael K. Reiter Automatically Adapting a Trained Anomaly Detector to Software Patches. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software patches, system-call monitoring, binary difference analysis, Anomaly detection
1Ikpeme Erete Browser-Based Intrusion Prevention System. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious Executable Detection, Portable Executables, Data Mining, Malware Detection, Structural Information
1Guanhua Yan, Stephan J. Eidenbenz, Emanuele Galli SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF JS-divergence, anomaly detection, SMS, relative entropy
1Chaoting Xuan, John A. Copeland, Raheem A. Beyah Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dynamic Analysis, Emulator, Rootkit
1Martin Rehák, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin Grill, Jan Stiborek, Karel Bartos, Thomas Engel 0001 Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Annie De Montigny-Leboeuf, Mathieu Couture, Frédéric Massicotte Traffic Behaviour Characterization Using NetMate. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel Method for Detecting Unknown Malicious Executables. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Laurent George 0002, Valérie Viet Triem Tong, Ludovic Mé Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor Automated Behavioral Fingerprinting. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yang Li 0002, Li Guo 0001, Binxing Fang, Xiangtao Liu, Lin Qi An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha Multi-byte Regular Expression Matching with Speculation. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF parallel pattern matching, speculative pattern matching, multi-byte, multi-byte matching, regular expressions, low latency
1Engin Kirda, Somesh Jha, Davide Balzarotti (eds.) Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF darknet monitoring, live network protection, alert system
1Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq Keystroke-Based User Identification on Smart Phones. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki Exploiting Temporal Persistence to Detect Covert Botnet Channels. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Frédéric Massicotte Packet Space Analysis of Intrusion Detection Signatures. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Asaf Shabtai, Uri Kanonov, Yuval Elovici Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF KBTA, Host-Based Intrusion Detection Systems, Mobile Devices
1Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee BLADE: Slashing the Invisible Channel of Drive-by Download Malware. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh Automatic Generation of String Signatures for Malware Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation
1Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo Brave New World: Pervasive Insecurity of Embedded Network Devices. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Router insecurity, network webcams, print servers, embedded device management interface exploitation, default password
1Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF self-update, anomaly detection, self-calibrate, sanitization
1Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel Automatic Software Instrumentation for the Detection of Non-control-data Attacks. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack classification, anomaly-based intrusion detection systems
1Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna Protecting a Moving Target: Addressing Web Application Concept Drift. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Machine Learning, Anomaly Detection, Concept Drift, Web Application Security
1Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras ALICE@home: Distributed Framework for Detecting Malicious Sites. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Grégoire Jacob, Hervé Debar, Eric Filiol Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Interpretation, Malware, Behaviors, Attribute-Grammars
1Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq Using Formal Grammar and Genetic Operators to Evolve Malware. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sean McAllister, Engin Kirda, Christopher Kruegel Leveraging User Interactions for In-Depth Testing of Web Applications. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malicious users, detection, insider threat, misuse
1Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar Evading Anomaly Detection through Variance Injection Attacks on PCA. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Junsup Lee, Sung Deok Cha Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF detector placement, Intrusion detection, Bayesian networks, attack graph
1Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 Countering Persistent Kernel Rootkits through Systematic Hook Discovery. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia Model-Based Covert Timing Channels: Automated Modeling and Evasion. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF traffic modeling, evasion, covert timing channels
1Daniel Ramsbrock, Xinyuan Wang 0005, Xuxian Jiang A First Step towards Live Botmaster Traceback. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Abhinav Srivastava, Jonathon T. Giffin Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machine introspection, attack prevention, Firewall
1Natalia Stakhanova, Chris Strasburg, Samik Basu 0001, Johnny S. Wong On Evaluation of Response Cost for Intrusion Response Systems. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1M. Patrick Collins, Michael K. Reiter On the Limits of Payload-Oblivious Network Attack Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evaluation, network intrusion detection, ROC curve
1Wei Lu 0018, Ali A. Ghorbani 0001 Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis Gnort: High Performance Network Intrusion Detection Using Graphics Processors. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD
1Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier Automating the Analysis of Honeypot Data (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internet threats analysis, malicious behavior characterization, Honeypots
1Mohamed Nassar 0001, Radu State, Olivier Festor Monitoring SIP Traffic Using Support Vector Machines. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Richard Lippmann, Engin Kirda, Ari Trachtenberg (eds.) Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Lorenzo Cavallaro, R. Sekar 0001 Anomalous Taint Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez 0001, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan Anticipating Hidden Text Salting in Emails. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nathalie Dagorn WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web application, Anomaly detection, Correlation
1Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh A Study of the Packer Problem and Its Solutions. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer Predicting the Resource Consumption of Network Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Simon P. Chung, Aloysius K. Mok Swarm Attacks against Network-Level Emulation/Analysis. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Decoder detection, network-level emulation, swarm attacks, network IDS, evasion
1Ashish Kamra, Elisa Bertino Database Intrusion Detection and Response. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Humberto J. Abdelnur, Radu State, Olivier Festor Advanced Network Fingerprinting. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Passive Fingerprinting, Structural syntax inference, Feature extraction
1Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin System Call API Obfuscation (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collaboration, Dynamic Programming, Worms, Control Theory
1Ryan D. Riley, Xuxian Jiang, Dongyan Xu Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek Improving Anomaly Detection Error Rate by Collective Trust Modeling. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kevin S. Killourhy, Roy A. Maxion The Effect of Clock Resolution on Keystroke Dynamics. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Insider-attack detection, Digital biometrics, Anomaly detection, Keystroke dynamics
1Andrew Brown 0005, Mark Ryan 0001 Monitoring the Execution of Third-Party Software on Mobile Devices. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 609 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license