|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 222 occurrences of 140 keywords
|
|
|
Results
Found 609 publication records. Showing 609 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kevin S. Killourhy, Roy A. Maxion |
Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Martin Drasar, Jan Vykopal, Radek Krejcí, Pavel Celeda |
Aspect-Based Attack Detection in Large-Scale Networks. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kevin A. Roundy, Barton P. Miller |
Hybrid Analysis and Control of Malware. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro |
Live and Trustworthy Forensic Analysis of Commodity Production Systems. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Abhinav Srivastava, Jonathon T. Giffin |
Automatic Discovery of Parasitic Malware. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Giorgos Vasiliadis, Sotiris Ioannidis |
GrAVity: A Massively Parallel Antivirus Engine. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jianchun Jiang, Weifeng Chen 0001, Liping Ding |
On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken |
Community Epidemic Detection Using Time-Correlated Anomalies. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier |
An Analysis of Rogue AV Campaigns. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | FuYong Zhang, DeYu Qi 0001, JingLin Hu |
Using IRP for Malware Detection. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang |
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed |
A Distributed Honeynet at KFUPM: A Case Study. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kui Xu 0002, Qiang Ma 0006, Danfeng (Daphne) Yao |
Detecting the Onset of Infection for Secure Hosts. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam |
What Is the Impact of P2P Traffic on Anomaly Detection? |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yunjing Xu, Michael D. Bailey, Eric Vander Weele, Farnam Jahanian |
CANVuS: Context-Aware Network Vulnerability Scanning. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Serguei A. Mokhov, Joey Paquet, Mourad Debbabi |
Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Kamra, Elisa Bertino |
Privilege States Based Access Control for Fine-Grained Intrusion Response. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Robert Koch 0002, Gabi Dreo Rodosek |
Security System for Encrypted Environments (S2E2). |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hosoi Takurou, Kanta Matsuura |
Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo 0001, Shambhu J. Upadhyaya |
A Data-Centric Approach to Insider Attack Detection in Database Systems. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shad Stafford, Jun Li 0001 |
Behavior-Based Worm Detectors Compared. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel |
MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Teresa Pepe |
Detecting Network Anomalies in Backbone Networks. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Peng Li 0059, Limin Liu, Debin Gao, Michael K. Reiter |
On Challenges in Evaluating Malware Clustering. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Charles V. Wright, Christopher Connelly, Timothy M. Braje, Jesse C. Rabek, Lee M. Rossey, Robert K. Cunningham |
Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Salman Niksefat, Mohammad Mehdi Ahaniha, Babak Sadeghiyan, Mehdi Shajari |
Toward Specification-Based Intrusion Detection for Web Applications. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen |
Fast-Flux Bot Detection in Real Time. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo |
Bait Your Hook: A Novel Detection Technique for Keyloggers. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Whelan, David R. Kaeli |
Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Luyi Xing, Yuqing Zhang, Shenlong Chen |
A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yipeng Wang 0001, Zhibin Zhang, Li Guo 0001 |
Inferring Protocol State Machine from Real-World Trace. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Somesh Jha, Robin Sommer, Christian Kreibich (eds.) |
Recent Advances in Intrusion Detection, 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor |
A Centralized Monitoring Infrastructure for Improving DNS Security. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Wang 0008, Angelos Stavrou, Anup K. Ghosh |
HyperCheck: A Hardware-Assisted Integrity Monitor. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wang 0012, Thomas Guyet, Svein J. Knapskog |
Autonomic Intrusion Detection System. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Milosz Marian Hulboj, Ryszard Erazm Jurga |
CERN Investigation of Network Behaviour and Anomaly Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, computer networks, network monitoring, packet sampling |
1 | Lei Liu 0021, Guanhua Yan, Xinwen Zhang, Songqing Chen |
VirusMeter: Preventing Your Cellphone from Spies. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
mobile malware, mobile device security, anomaly detection, power consumption |
1 | Giorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis |
Regular Expression Matching on Graphics Hardware for Intrusion Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam |
On the Inefficient Use of Entropy for Anomaly Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peng Li 0059, Debin Gao, Michael K. Reiter |
Automatically Adapting a Trained Anomaly Detector to Software Patches. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
software patches, system-call monitoring, binary difference analysis, Anomaly detection |
1 | Ikpeme Erete |
Browser-Based Intrusion Prevention System. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq |
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Malicious Executable Detection, Portable Executables, Data Mining, Malware Detection, Structural Information |
1 | Guanhua Yan, Stephan J. Eidenbenz, Emanuele Galli |
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
JS-divergence, anomaly detection, SMS, relative entropy |
1 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Dynamic Analysis, Emulator, Rootkit |
1 | Martin Rehák, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin Grill, Jan Stiborek, Karel Bartos, Thomas Engel 0001 |
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Annie De Montigny-Leboeuf, Mathieu Couture, Frédéric Massicotte |
Traffic Behaviour Characterization Using NetMate. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel |
Method for Detecting Unknown Malicious Executables. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Laurent George 0002, Valérie Viet Triem Tong, Ludovic Mé |
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor |
Automated Behavioral Fingerprinting. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yang Li 0002, Li Guo 0001, Binxing Fang, Xiangtao Liu, Lin Qi |
An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha |
Multi-byte Regular Expression Matching with Speculation. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
parallel pattern matching, speculative pattern matching, multi-byte, multi-byte matching, regular expressions, low latency |
1 | Engin Kirda, Somesh Jha, Davide Balzarotti (eds.) |
Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao |
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
darknet monitoring, live network protection, alert system |
1 | Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq |
Keystroke-Based User Identification on Smart Phones. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki |
Exploiting Temporal Persistence to Detect Covert Botnet Channels. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Massicotte |
Packet Space Analysis of Intrusion Detection Signatures. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Asaf Shabtai, Uri Kanonov, Yuval Elovici |
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
KBTA, Host-Based Intrusion Detection Systems, Mobile Devices |
1 | Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee |
BLADE: Slashing the Invisible Channel of Drive-by Download Malware. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh |
Automatic Generation of String Signatures for Malware Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation |
1 | Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo |
Brave New World: Pervasive Insecurity of Embedded Network Devices. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Router insecurity, network webcams, print servers, embedded device management interface exploitation, default password |
1 | Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo |
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
self-update, anomaly detection, self-calibrate, sanitization |
1 | Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel |
Automatic Software Instrumentation for the Detection of Non-control-data Attacks. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel |
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
attack classification, anomaly-based intrusion detection systems |
1 | Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song |
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna |
Protecting a Moving Target: Addressing Web Application Concept Drift. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Machine Learning, Anomaly Detection, Concept Drift, Web Application Security |
1 | Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras |
ALICE@home: Distributed Framework for Detecting Malicious Sites. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Grégoire Jacob, Hervé Debar, Eric Filiol |
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Interpretation, Malware, Behaviors, Attribute-Grammars |
1 | Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Using Formal Grammar and Genetic Operators to Evolve Malware. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sean McAllister, Engin Kirda, Christopher Kruegel |
Leveraging User Interactions for In-Depth Testing of Web Applications. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim |
An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
malicious users, detection, insider threat, misuse |
1 | Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar |
Evading Anomaly Detection through Variance Injection Attacks on PCA. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Junsup Lee, Sung Deok Cha |
Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon |
Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
detector placement, Intrusion detection, Bayesian networks, attack graph |
1 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 |
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia |
Model-Based Covert Timing Channels: Automated Modeling and Evasion. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
traffic modeling, evasion, covert timing channels |
1 | Daniel Ramsbrock, Xinyuan Wang 0005, Xuxian Jiang |
A First Step towards Live Botmaster Traceback. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Abhinav Srivastava, Jonathon T. Giffin |
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
virtual machine introspection, attack prevention, Firewall |
1 | Natalia Stakhanova, Chris Strasburg, Samik Basu 0001, Johnny S. Wong |
On Evaluation of Response Cost for Intrusion Response Systems. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | M. Patrick Collins, Michael K. Reiter |
On the Limits of Payload-Oblivious Network Attack Detection. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
evaluation, network intrusion detection, ROC curve |
1 | Wei Lu 0018, Ali A. Ghorbani 0001 |
Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis |
Gnort: High Performance Network Intrusion Detection Using Graphics Processors. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD |
1 | Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier |
Automating the Analysis of Honeypot Data (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Internet threats analysis, malicious behavior characterization, Honeypots |
1 | Mohamed Nassar 0001, Radu State, Olivier Festor |
Monitoring SIP Traffic Using Support Vector Machines. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Richard Lippmann, Engin Kirda, Ari Trachtenberg (eds.) |
Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lorenzo Cavallaro, R. Sekar 0001 |
Anomalous Taint Detection. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez 0001, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan |
Anticipating Hidden Text Salting in Emails. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nathalie Dagorn |
WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Web application, Anomaly detection, Correlation |
1 | Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina |
Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh |
A Study of the Packer Problem and Its Solutions. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer |
Predicting the Resource Consumption of Network Intrusion Detection Systems. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Simon P. Chung, Aloysius K. Mok |
Swarm Attacks against Network-Level Emulation/Analysis. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Decoder detection, network-level emulation, swarm attacks, network IDS, evasion |
1 | Ashish Kamra, Elisa Bertino |
Database Intrusion Detection and Response. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam |
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Humberto J. Abdelnur, Radu State, Olivier Festor |
Advanced Network Fingerprinting. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Passive Fingerprinting, Structural syntax inference, Feature extraction |
1 | Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin |
System Call API Obfuscation (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe |
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Collaboration, Dynamic Programming, Worms, Control Theory |
1 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek |
Improving Anomaly Detection Error Rate by Collective Trust Modeling. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kevin S. Killourhy, Roy A. Maxion |
The Effect of Clock Resolution on Keystroke Dynamics. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Insider-attack detection, Digital biometrics, Anomaly detection, Keystroke dynamics |
1 | Andrew Brown 0005, Mark Ryan 0001 |
Monitoring the Execution of Third-Party Software on Mobile Devices. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 609 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|