The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "RAID"( http://dblp.L3S.de/Venues/RAID )

URL (DBLP): http://dblp.uni-trier.de/db/conf/raid

Publication years (Num. hits)
2000-2002 (20) 2003-2004 (31) 2005 (17) 2006 (18) 2007 (18) 2008 (37) 2009 (34) 2010 (40) 2011 (21) 2012 (31) 2013 (23) 2014 (23) 2015 (29) 2016 (22) 2017 (22) 2018 (33) 2019 (38) 2020 (32) 2021 (33) 2022 (36) 2023 (51)
Publication types (Num. hits)
inproceedings(585) proceedings(24)
Venues (Conferences, Journals, ...)
RAID(609)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 222 occurrences of 140 keywords

Results
Found 609 publication records. Showing 609 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Paul Rubel, Partha P. Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Divya Jain, K. Vasanta Lakshmi, Priti Shankar Deep Packet Inspection Using Message Passing Networks. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nabil Schear, David R. Albrecht, Nikita Borisov High-Speed Matching of Vulnerability Signatures. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell A Layered Architecture for Detecting Malicious Behaviors. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dynamic, Malware, Behavior, Data-Flow, Semantic Gap
1Magnus Almgren, Ulf Lindqvist, Erland Jonsson A Multi-Sensor Model to Improve Automated Attack Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF alert reasoning, intrusion detection
1Jeffrey Wilhelm, Tzi-cker Chiueh A Forced Sampled Execution Approach to Kernel Rootkit Identification. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection
1Marcus A. Maloof, Gregory D. Stephens elicit: A System for Detecting Insiders Who Violate Need-to-Know. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly detection, insider threat, misuse
1Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kenneth L. Ingham, Hajime Inoue Comparing Anomaly Detection Techniques for HTTP. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hypertext transport protocol, Intrusion detection, Anomaly detection, HTTP, Comparison
1Federico Maggi, Stefano Zanero On the Use of Different Statistical Tests for Alert Correlation - Short Paper. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Christopher Krügel, Richard Lippmann, Andrew J. Clark (eds.) Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1John R. Lange, Peter A. Dinda, Fabián E. Bustamante Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF volunteer systems, honeypots, honeynets, wormholes
1Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario Automated Classification and Analysis of Internet Malware. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Matthias Vallentin, Robin Sommer, Jason Lee 0001, Craig Leres, Vern Paxson, Brian Tierney The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Simon P. Chung, Aloysius K. Mok Advanced Allergy Attacks: Does a Corpus Really Help? Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Automatic Signature Generation, Allergy Attacks, Intrusion Prevention Systems
1Xuxian Jiang, Xinyuan Wang 0005 "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Response Agent (RA), Topology Dependency Index (TDI), Attack Damage Index (ADI), adaptive isolation, attack damage, response cost, MANET
1Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web Attacks, Anomaly Detection, Dynamic Analysis, Code Instrumentation
1Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers Alert Verification Evasion Through Server Response Forging. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Alert Verification, Network Intrusion Detection, Exploits, Evasion
1Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer Exploiting Execution Context for the Detection of Anomalous System Calls. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF System Call Argument Analysis, Execution Context, Intrusion Detection
1M. Patrick Collins, Michael K. Reiter Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly detection, Graph analysis, Large networks
1Zhuowei Li 0001, XiaoFeng Wang 0001, Jong Youl Choi SpyShield: Preserving Privacy from Spy Add-Ons. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Monirul Islam Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee Understanding Precision in Host Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly detection, Program models, Formal analysis
1Simon P. Chung, Aloysius K. Mok Allergy Attack Against Automatic Signature Generation. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Automatic Signature Generation, Adaptive Response, Intrusion Prevention
1Alfonso Valdes, Diego Zamboni (eds.) Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1James Newsome, Brad Karp, Dawn Xiaodong Song Paragraph: Thwarting Signature Learning by Training Maliciously. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Corrado Leita, Marc Dacier, Frédéric Massicotte Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DEMEM, TBRPF, attack method, MPR selector, Hello message, TC message, ID message, ID Manager, ID-Evidence, ID-Forward, ID-Request, MANET, constraint, IDS, AODV, evidence, DSR, OLSR, forwarder, TESLA, MPR
1Ke Wang 0009, Janak J. Parekh, Salvatore J. Stolfo Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling The Nepenthes Platform: An Efficient Approach to Collect Malware. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jonathon T. Giffin, Somesh Jha, Barton P. Miller Automated Discovery of Mimicry Attacks. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IDS evaluation, model-based anomaly detection, model checking, attacks
1James J. Treinen, Ramakrishna Thurimella A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data Mining, Intrusion Detection, Association Rules, Graph Algorithms
1André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer Using Hidden Markov Models to Evaluate the Risks of Intrusions. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hidden Markov modeling, Intrusion detection, Risk assessment
1Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis Fast and Evasive Attacks: Highlighting the Challenges Ahead. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Worms, Network Security, Network Monitoring, Invasive Software
1Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu 0001, Edmund M. Clarke, Jeannette M. Wing Ranking Attack Graphs. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Google PageRank, Model Checking, security metric, Attack Graph, Attack Model
1Sushant Sinha, Farnam Jahanian, Jignesh M. Patel WIND: Workload-Aware INtrusion Detection. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF workload aware, adaptive algorithm, deep packet inspection, Intrusion detection and prevention
1Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion Anomaly Detector Performance Evaluation Using a Parameterized Environment. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Diego Zamboni, Christopher Krügel (eds.) Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Debin Gao, Michael K. Reiter, Dawn Xiaodong Song Behavioral Distance Measurement Using Hidden Markov Models. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF behavioral distance, intrusion detection, anomaly detection, system call
1Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomás Hrubý, Li Xu, Herbert Bos SafeCard: A Gigabit IPS on the Network Card. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1José M. González, Vern Paxson Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Tadeusz Pietraszek, Chris Vanden Berghe Defending Against Injection Attacks Through Context-Sensitive String Evaluation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Simon P. Chung, Aloysius K. Mok On Random-Inspection-Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random inspection, intrusion detection, computer security, Mimicry attacks
1Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna Polymorphic Worm Detection Using Structural Information of Executables. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ramkumar Chinchani, Eric van den Berg A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Eric Totel, Frédéric Majorczyk, Ludovic Mé COTS Diversity Based Intrusion Detection and Application to Web Servers. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COTS diversity, Intrusion detection, anomaly detection, design diversity
1Chris Muelder, Kwan-Liu Ma, Tony Bartoletti Interactive Visualization for Network and Port Scan Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network scans, user interfaces, information visualization, intrusion detection, Network security, port scans
1Debin Gao, Michael K. Reiter, Dawn Xiaodong Song Behavioral Distance for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF behavioral distance, Intrusion detection, system call
1Herbert Bos, Kaiming Huang Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed firewall, network processors
1Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt A Specification-Based Intrusion Detection Model for OLSR. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Specification based IDS, MANET, Mobile ad hoc network, Intrusion Detection, Network Security, Constraints, OLSR
1Fanglu Guo, Tzi-cker Chiueh Sequence Number-Based MAC Address Spoof Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Wireless LAN MAC spoof detection, WLAN monitoring and intrusion detection, Sequence number
1Ke Wang 0009, Gabriela F. Cretu, Salvatore J. Stolfo Anomalous Payload-Based Worm Detection and Signature Generation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sufatrio, Roland H. C. Yap Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Seung-Sun Hong, Shyhtsun Felix Wu On Interactive Internet Traffic Replay. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael E. Locasto, Ke Wang 0009, Angelos D. Keromytis, Salvatore J. Stolfo FLIPS: Hybrid Adaptive Intrusion Prevention. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Adaptive Response, Intrusion Tolerance, Intrusion Prevention
1Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford Virtual Playgrounds for Worm Behavior Investigation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion Observation and Analysis, Destructive Experiments, Internet Worms
1Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller Environment-Sensitive Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang Empirical Analysis of Rate Limiting Mechanisms. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Internet Worms, Rate Limiting, Worm Containment
1Erland Jonsson, Alfonso Valdes, Magnus Almgren (eds.) Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Brian Hernacki, Jeremy Bennett, Thomas Lofgren Symantec Deception Server Experience with a Commercial Deception System. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ManTrap, Honeypot, Deception
1Jouni Viinikka, Hervé Debar Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDS background noise, alert volume reduction, EWMA
1Stuart E. Schechter, Jaeyeon Jung, Arthur W. Berger Fast Detection of Scanning Worm Infections. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen HoneyStat: Local Worm Detection Using Honeypots. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Random walks, Network intrusion detection, Stepping stones, Evasion, Interactive sessions
1Ke Wang 0009, Salvatore J. Stolfo Anomalous Payload-Based Network Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Vinod Yegneswaran, Paul Barford, David Plonka On the Design and Use of Internet Sinks for Network Abuse Monitoring. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Deception Systems, Intrusion Detection, Honeypots
1Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, Hui Zhang 0001 Seurat: A Pointillist Approach to Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Pointillism, File updates, Clustering, Anomaly detection, Correlation
1Ashish Gehani, Gershon Kedem RheoStat: Real-Time Risk Management. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tadeusz Pietraszek Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Haizhi Xu, Wenliang Du, Steve J. Chapin Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Lap-Chung Lam, Tzi-cker Chiueh Automatic Extraction of Accurate Application-Specific Sandboxing Policy. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF system call graph, non-deterministic finite state automaton, intrusion detection, sandboxing, mimicry attack
1Yi-an Huang, Wenke Lee Attack Analysis and Detection for Ad Hoc Routing Protocols. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt Formal Reasoning About Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verification, formal method, Intrusion detection, security policy
1Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Layered networks, PCA, Anomaly detection, User behavior, Co-occurrence matrix
1Ruiqi Hu, Aloysius K. Mok Detecting Unknown Massive Mailing Viruses Using Proactive Methods. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF malicious executable detection, intrusion detection, virus detection
1Xinzhou Qin, Wenke Lee Statistical Causality Analysis of INFOSEC Alert Data. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF attack scenario analysis, Intrusion detection, time series analysis, alert correlation
1Manikantan Ramadas, Shawn Ostermann, Brett C. Tjaden Detecting Anomalous Network Traffic with Self-organizing Maps. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion Detection, Self-Organizing Maps, Anomaly Detection
1Marcus Tylutki, Karl N. Levitt Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF PID control law, Automated Response, Denial of Service, DoS, Distributed Denial of Service, DDoS, Control Theory, Distributed Attacks
1Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur Topology-Based Detection of Anomalous BGP Messages. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jeffrey Undercoffer, Anupam Joshi, John Pinkston Modeling Computer Attacks: An Ontology for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Greg Taleck Ambiguity Resolution via Passive OS Fingerprinting. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Benjamin Morin, Hervé Debar Correlation of Intrusion Symptoms: An Application of Chronicles. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Giovanni Vigna, Erland Jonsson, Christopher Krügel (eds.) Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl N. Levitt Using Specification-Based Intrusion Detection for Automated Response. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ajay Gupta 0002, R. Sekar 0001 An Approach for Detecting Self-propagating Email Using Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Matthew V. Mahoney 0001, Philip K. Chan An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sung-Bae Cho, Sang-Jun Han Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privilege flow, combining multiple models, hidden Markov model, anomaly detection
1Lambert Schaelicke, Thomas Slabach, Branden J. Moore, Curt Freeland Characterizing the Performance of Network Intrusion Detection Sensors. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Christopher Krügel, Thomas Toth Using Decision Trees to Improve Signature-Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Vladimir I. Gorodetski, Igor V. Kotenko Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé M2D2: A Formal Data Model for IDS Alert Correlation. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Kwong H. Yung Detecting Long Connection Chains of Interactive Terminal Sessions. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF connection chain, terminal session, delayed acknowledgment, reply echo, echo delay, intrusion detection, network security, computer security, network protocol, Stepping stone
1Phillip A. Porras, Martin W. Fong, Alfonso Valdes A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion report correlation, alert management, alert prioritization, Network security
1Mike Hall, Kevin Wiley Capacity Verification for High Speed Network Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Thomas Toth, Christopher Krügel Accurate Buffer Overflow Detection via Abstract Payload Execution. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Intrusion Detecion, Buffer Overflow Exploit, Network Security
1Steven R. Johnston Development of a Legal Framework for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception
1David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Richard Lippmann, Seth E. Webster, Douglas Stetson The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm
1Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Robert P. Goldman A Stochastic Model for Intrusions. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 609 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license