The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RAID with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1986-1991 (15) 1992-1993 (17) 1994-1995 (30) 1996-1997 (20) 1998-1999 (52) 2000 (32) 2001 (27) 2002 (33) 2003 (41) 2004 (44) 2005 (55) 2006 (54) 2007 (66) 2008 (79) 2009 (82) 2010 (71) 2011 (63) 2012 (66) 2013 (72) 2014 (64) 2015 (80) 2016 (70) 2017 (57) 2018 (84) 2019 (72) 2020 (62) 2021 (61) 2022 (55) 2023 (87) 2024 (7)
Publication types (Num. hits)
article(327) book(1) incollection(4) inproceedings(1252) phdthesis(7) proceedings(27)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 668 occurrences of 366 keywords

Results
Found 1659 publication records. Showing 1618 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
33Tobias Lauinger, Engin Kirda, Pietro Michiardi Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Luis Javier García-Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco, Javier Martínez Puentes Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Dina Hadziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro, Herbert Bos Memory Errors: The Past, the Present, and the Future. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan, Martin Lee Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens, Martin Johns DEMACRO: Defense against Malicious Cross-Domain Requests. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Shah Mahmood, Yvo Desmedt Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Zhi Xu 0004, Hung-Yuan Hsu, Xin Chen, Sencun Zhu, Ali R. Hurson AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Lukás Durfina, Jakub Kroustek, Petr Zemek, Bretislav Kábele Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Hugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro, Luis Javier García-Villalba Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Shengzhi Zhang, Peng Liu 0005 Assessing the Trustworthiness of Drivers. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Shuyuan Jin, Zhi Yang, Xiang Cui Automatic Covert Channel Detection in Asbestos System (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna FlashDetect: ActionScript 3 Malware Detection. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Dengke Qiao, Tingwen Liu, Yong Sun, Li Guo 0001 EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Samuel Marchal, Jérôme François, Radu State, Thomas Engel 0001 Proactive Discovery of Phishing Related Domain Names. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Jenny Andrea Pinto Sánchez, Luis Javier García-Villalba Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Robin Sommer, Davide Balzarotti, Gregor Maier (eds.) Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Ang Cui, Salvatore J. Stolfo Defending Embedded Systems with Software Symbiotes. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Felix Gröbert, Carsten Willems, Thorsten Holz Automated Identification of Cryptographic Primitives in Binary Programs. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Syed Akbar Mehdi, Junaid Khalid, Syed Ali Khayam Revisiting Traffic Anomaly Detection Using Software Defined Networking. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Malek Ben Salem 0001, Salvatore J. Stolfo Modeling User Search Behavior for Masquerade Detection. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Mario Heiderich, Tilman Frosch, Thorsten Holz IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao Packed, Printable, and Polymorphic Return-Oriented Programming. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Armin Buescher, Felix Leder, Thomas Siebert Banksafe Information Stealer Detection Inside the Web Browser. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Loïc Duflot, Yves-Alexis Perez, Benjamin Morin What If You Can't Trust Your Network Card? Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Erik Bosman, Asia Slowinska, Herbert Bos Minemu: The World's Fastest Taint Tracker. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru, Radu State Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Chao Yang 0022, Robert Chandler Harkreader, Guofei Gu Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis Detecting Traffic Snooping in Tor Using Decoys. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna Dymo: Tracking Dynamic Code Identity. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti Detecting Environment-Sensitive Malware. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning On the Expressiveness of Return-into-libc Attacks. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Jonghyuk Song, Sangho Lee 0001, Jong Kim 0001 Spam Filtering in Twitter Using Sender-Receiver Relationship. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Seungwon Shin, Raymond Lin, Guofei Gu Cross-Analysis of Botnet Victims: New Insights and Implications. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Somesh Jha, Robin Sommer, Christian Kreibich (eds.) Recent Advances in Intrusion Detection, 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Smith Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Paul Giura, Nasir D. Memon NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel Abusing Social Networks for Automated User Profiling. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani Anomaly Detection and Mitigation for Disaster Area Networks. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Ying Kong, Yuqing Zhang 0001, Qixu Liu Eliminating Human Specification in Static Analysis. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Kevin S. Killourhy, Roy A. Maxion Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Martin Drasar, Jan Vykopal, Radek Krejcí, Pavel Celeda Aspect-Based Attack Detection in Large-Scale Networks. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Kevin A. Roundy, Barton P. Miller Hybrid Analysis and Control of Malware. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro Live and Trustworthy Forensic Analysis of Commodity Production Systems. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Abhinav Srivastava, Jonathon T. Giffin Automatic Discovery of Parasitic Malware. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Giorgos Vasiliadis, Sotiris Ioannidis GrAVity: A Massively Parallel Antivirus Engine. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Jianchun Jiang, Weifeng Chen 0001, Liping Ding On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken Community Epidemic Detection Using Time-Correlated Anomalies. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier An Analysis of Rogue AV Campaigns. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33FuYong Zhang, DeYu Qi 0001, JingLin Hu Using IRP for Malware Detection. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Mohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed A Distributed Honeynet at KFUPM: A Case Study. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Kui Xu 0002, Qiang Ma 0006, Danfeng (Daphne) Yao Detecting the Onset of Infection for Secure Hosts. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam What Is the Impact of P2P Traffic on Anomaly Detection? Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Yunjing Xu, Michael D. Bailey, Eric Vander Weele, Farnam Jahanian CANVuS: Context-Aware Network Vulnerability Scanning. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Serguei A. Mokhov, Joey Paquet, Mourad Debbabi Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Ashish Kamra, Elisa Bertino Privilege States Based Access Control for Fine-Grained Intrusion Response. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Robert Koch 0002, Gabi Dreo Rodosek Security System for Encrypted Environments (S2E2). Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Hosoi Takurou, Kanta Matsuura Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo 0001, Shambhu J. Upadhyaya A Data-Centric Approach to Insider Attack Detection in Database Systems. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Shad Stafford, Jun Li 0001 Behavior-Based Worm Detectors Compared. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Teresa Pepe Detecting Network Anomalies in Backbone Networks. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Peng Li 0059, Limin Liu, Debin Gao, Michael K. Reiter On Challenges in Evaluating Malware Clustering. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Charles V. Wright, Christopher Connelly, Timothy M. Braje, Jesse C. Rabek, Lee M. Rossey, Robert K. Cunningham Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Salman Niksefat, Mohammad Mehdi Ahaniha, Babak Sadeghiyan, Mehdi Shajari Toward Specification-Based Intrusion Detection for Web Applications. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen Fast-Flux Bot Detection in Real Time. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo Bait Your Hook: A Novel Detection Technique for Keyloggers. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Ryan Whelan, David R. Kaeli Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Luyi Xing, Yuqing Zhang, Shenlong Chen A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Yipeng Wang 0001, Zhibin Zhang, Li Guo 0001 Inferring Protocol State Machine from Real-World Trace. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor A Centralized Monitoring Infrastructure for Improving DNS Security. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Jiang Wang 0008, Angelos Stavrou, Anup K. Ghosh HyperCheck: A Hardware-Assisted Integrity Monitor. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Engin Kirda, Somesh Jha, Davide Balzarotti (eds.) Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Wei Wang 0012, Thomas Guyet, Svein J. Knapskog Autonomic Intrusion Detection System. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Milosz Marian Hulboj, Ryszard Erazm Jurga CERN Investigation of Network Behaviour and Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, computer networks, network monitoring, packet sampling
33Lei Liu 0021, Guanhua Yan, Xinwen Zhang, Songqing Chen VirusMeter: Preventing Your Cellphone from Spies. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile malware, mobile device security, anomaly detection, power consumption
33Giorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis Regular Expression Matching on Graphics Hardware for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam On the Inefficient Use of Entropy for Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Peng Li 0059, Debin Gao, Michael K. Reiter Automatically Adapting a Trained Anomaly Detector to Software Patches. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software patches, system-call monitoring, binary difference analysis, Anomaly detection
33Ikpeme Erete Browser-Based Intrusion Prevention System. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious Executable Detection, Portable Executables, Data Mining, Malware Detection, Structural Information
33Guanhua Yan, Stephan J. Eidenbenz, Emanuele Galli SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF JS-divergence, anomaly detection, SMS, relative entropy
33Chaoting Xuan, John A. Copeland, Raheem A. Beyah Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dynamic Analysis, Emulator, Rootkit
33Martin Rehák, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin Grill, Jan Stiborek, Karel Bartos, Thomas Engel 0001 Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Annie De Montigny-Leboeuf, Mathieu Couture, Frédéric Massicotte Traffic Behaviour Characterization Using NetMate. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel Method for Detecting Unknown Malicious Executables. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Laurent George 0002, Valérie Viet Triem Tong, Ludovic Mé Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor Automated Behavioral Fingerprinting. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Yang Li 0002, Li Guo 0001, Binxing Fang, Xiangtao Liu, Lin Qi An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha Multi-byte Regular Expression Matching with Speculation. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF parallel pattern matching, speculative pattern matching, multi-byte, multi-byte matching, regular expressions, low latency
33Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF darknet monitoring, live network protection, alert system
33Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq Keystroke-Based User Identification on Smart Phones. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki Exploiting Temporal Persistence to Detect Covert Botnet Channels. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Frédéric Massicotte Packet Space Analysis of Intrusion Detection Signatures. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 1618 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license