|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 668 occurrences of 366 keywords
|
|
|
Results
Found 1659 publication records. Showing 1618 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
33 | Asaf Shabtai, Uri Kanonov, Yuval Elovici |
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
KBTA, Host-Based Intrusion Detection Systems, Mobile Devices |
33 | Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee |
BLADE: Slashing the Invisible Channel of Drive-by Download Malware. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh |
Automatic Generation of String Signatures for Malware Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation |
33 | Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo |
Brave New World: Pervasive Insecurity of Embedded Network Devices. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Router insecurity, network webcams, print servers, embedded device management interface exploitation, default password |
33 | Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo |
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
self-update, anomaly detection, self-calibrate, sanitization |
33 | Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel |
Automatic Software Instrumentation for the Detection of Non-control-data Attacks. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel |
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
attack classification, anomaly-based intrusion detection systems |
33 | Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song |
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna |
Protecting a Moving Target: Addressing Web Application Concept Drift. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Machine Learning, Anomaly Detection, Concept Drift, Web Application Security |
33 | Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras |
ALICE@home: Distributed Framework for Detecting Malicious Sites. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Grégoire Jacob, Hervé Debar, Eric Filiol |
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Interpretation, Malware, Behaviors, Attribute-Grammars |
33 | Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Using Formal Grammar and Genetic Operators to Evolve Malware. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Richard Lippmann, Engin Kirda, Ari Trachtenberg (eds.) |
Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Sean McAllister, Engin Kirda, Christopher Kruegel |
Leveraging User Interactions for In-Depth Testing of Web Applications. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim |
An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
malicious users, detection, insider threat, misuse |
33 | Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar |
Evading Anomaly Detection through Variance Injection Attacks on PCA. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Junsup Lee, Sung Deok Cha |
Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon |
Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
detector placement, Intrusion detection, Bayesian networks, attack graph |
33 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 |
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia |
Model-Based Covert Timing Channels: Automated Modeling and Evasion. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
traffic modeling, evasion, covert timing channels |
33 | Daniel Ramsbrock, Xinyuan Wang 0005, Xuxian Jiang |
A First Step towards Live Botmaster Traceback. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Abhinav Srivastava, Jonathon T. Giffin |
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
virtual machine introspection, attack prevention, Firewall |
33 | Natalia Stakhanova, Chris Strasburg, Samik Basu 0001, Johnny S. Wong |
On Evaluation of Response Cost for Intrusion Response Systems. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | M. Patrick Collins, Michael K. Reiter |
On the Limits of Payload-Oblivious Network Attack Detection. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
evaluation, network intrusion detection, ROC curve |
33 | Wei Lu 0018, Ali A. Ghorbani 0001 |
Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis |
Gnort: High Performance Network Intrusion Detection Using Graphics Processors. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD |
33 | Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier |
Automating the Analysis of Honeypot Data (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Internet threats analysis, malicious behavior characterization, Honeypots |
33 | Mohamed Nassar 0001, Radu State, Olivier Festor |
Monitoring SIP Traffic Using Support Vector Machines. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Lorenzo Cavallaro, R. Sekar 0001 |
Anomalous Taint Detection. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez 0001, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan |
Anticipating Hidden Text Salting in Emails. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Nathalie Dagorn |
WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Web application, Anomaly detection, Correlation |
33 | Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina |
Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh |
A Study of the Packer Problem and Its Solutions. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer |
Predicting the Resource Consumption of Network Intrusion Detection Systems. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Simon P. Chung, Aloysius K. Mok |
Swarm Attacks against Network-Level Emulation/Analysis. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Decoder detection, network-level emulation, swarm attacks, network IDS, evasion |
33 | Ashish Kamra, Elisa Bertino |
Database Intrusion Detection and Response. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam |
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Humberto J. Abdelnur, Radu State, Olivier Festor |
Advanced Network Fingerprinting. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Passive Fingerprinting, Structural syntax inference, Feature extraction |
33 | Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin |
System Call API Obfuscation (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe |
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Collaboration, Dynamic Programming, Worms, Control Theory |
33 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek |
Improving Anomaly Detection Error Rate by Collective Trust Modeling. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Kevin S. Killourhy, Roy A. Maxion |
The Effect of Clock Resolution on Keystroke Dynamics. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Insider-attack detection, Digital biometrics, Anomaly detection, Keystroke dynamics |
33 | Andrew Brown 0005, Mark Ryan 0001 |
Monitoring the Execution of Third-Party Software on Mobile Devices. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Paul Rubel, Partha P. Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber |
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Divya Jain, K. Vasanta Lakshmi, Priti Shankar |
Deep Packet Inspection Using Message Passing Networks. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Nabil Schear, David R. Albrecht, Nikita Borisov |
High-Speed Matching of Vulnerability Signatures. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell |
A Layered Architecture for Detecting Malicious Behaviors. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Dynamic, Malware, Behavior, Data-Flow, Semantic Gap |
33 | Magnus Almgren, Ulf Lindqvist, Erland Jonsson |
A Multi-Sensor Model to Improve Automated Attack Detection. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
alert reasoning, intrusion detection |
33 | Christopher Krügel, Richard Lippmann, Andrew J. Clark (eds.) |
Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Jeffrey Wilhelm, Tzi-cker Chiueh |
A Forced Sampled Execution Approach to Kernel Rootkit Identification. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection |
33 | Marcus A. Maloof, Gregory D. Stephens |
elicit: A System for Detecting Insiders Who Violate Need-to-Know. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
anomaly detection, insider threat, misuse |
33 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Kenneth L. Ingham, Hajime Inoue |
Comparing Anomaly Detection Techniques for HTTP. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Hypertext transport protocol, Intrusion detection, Anomaly detection, HTTP, Comparison |
33 | Federico Maggi, Stefano Zanero |
On the Use of Different Statistical Tests for Alert Correlation - Short Paper. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
33 | John R. Lange, Peter A. Dinda, Fabián E. Bustamante |
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
volunteer systems, honeypots, honeynets, wormholes |
33 | Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario |
Automated Classification and Analysis of Internet Malware. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Matthias Vallentin, Robin Sommer, Jason Lee 0001, Craig Leres, Vern Paxson, Brian Tierney |
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Simon P. Chung, Aloysius K. Mok |
Advanced Allergy Attacks: Does a Corpus Really Help? |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Automatic Signature Generation, Allergy Attacks, Intrusion Prevention Systems |
33 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop |
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Response Agent (RA), Topology Dependency Index (TDI), Attack Damage Index (ADI), adaptive isolation, attack damage, response cost, MANET |
33 | Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna |
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Web Attacks, Anomaly Detection, Dynamic Analysis, Code Instrumentation |
33 | Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers |
Alert Verification Evasion Through Server Response Forging. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Alert Verification, Network Intrusion Detection, Exploits, Evasion |
33 | Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer |
Exploiting Execution Context for the Detection of Anomalous System Calls. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
System Call Argument Analysis, Execution Context, Intrusion Detection |
33 | M. Patrick Collins, Michael K. Reiter |
Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Anomaly detection, Graph analysis, Large networks |
33 | Zhuowei Li 0001, XiaoFeng Wang 0001, Jong Youl Choi |
SpyShield: Preserving Privacy from Spy Add-Ons. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Monirul Islam Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee |
Understanding Precision in Host Based Intrusion Detection. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Anomaly detection, Program models, Formal analysis |
33 | Alfonso Valdes, Diego Zamboni (eds.) |
Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Diego Zamboni, Christopher Krügel (eds.) |
Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Simon P. Chung, Aloysius K. Mok |
Allergy Attack Against Automatic Signature Generation. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Automatic Signature Generation, Adaptive Response, Intrusion Prevention |
33 | James Newsome, Brad Karp, Dawn Xiaodong Song |
Paragraph: Thwarting Signature Learning by Training Maliciously. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Corrado Leita, Marc Dacier, Frédéric Massicotte |
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt |
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
DEMEM, TBRPF, attack method, MPR selector, Hello message, TC message, ID message, ID Manager, ID-Evidence, ID-Forward, ID-Request, MANET, constraint, IDS, AODV, evidence, DSR, OLSR, forwarder, TESLA, MPR |
33 | Ke Wang 0009, Janak J. Parekh, Salvatore J. Stolfo |
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling |
The Nepenthes Platform: An Efficient Approach to Collect Malware. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Jonathon T. Giffin, Somesh Jha, Barton P. Miller |
Automated Discovery of Mimicry Attacks. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
IDS evaluation, model-based anomaly detection, model checking, attacks |
33 | James J. Treinen, Ramakrishna Thurimella |
A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Data Mining, Intrusion Detection, Association Rules, Graph Algorithms |
33 | André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer |
Using Hidden Markov Models to Evaluate the Risks of Intrusions. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Hidden Markov modeling, Intrusion detection, Risk assessment |
33 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
Fast and Evasive Attacks: Highlighting the Challenges Ahead. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Network Worms, Network Security, Network Monitoring, Invasive Software |
33 | Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu 0001, Edmund M. Clarke, Jeannette M. Wing |
Ranking Attack Graphs. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Google PageRank, Model Checking, security metric, Attack Graph, Attack Model |
33 | Sushant Sinha, Farnam Jahanian, Jignesh M. Patel |
WIND: Workload-Aware INtrusion Detection. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
workload aware, adaptive algorithm, deep packet inspection, Intrusion detection and prevention |
33 | Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion |
Anomaly Detector Performance Evaluation Using a Parameterized Environment. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song |
Behavioral Distance Measurement Using Hidden Markov Models. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
behavioral distance, intrusion detection, anomaly detection, system call |
33 | Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomás Hrubý, Li Xu, Herbert Bos |
SafeCard: A Gigabit IPS on the Network Card. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
33 | José M. González, Vern Paxson |
Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Tadeusz Pietraszek, Chris Vanden Berghe |
Defending Against Injection Attacks Through Context-Sensitive String Evaluation. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Simon P. Chung, Aloysius K. Mok |
On Random-Inspection-Based Intrusion Detection. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
random inspection, intrusion detection, computer security, Mimicry attacks |
33 | Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna |
Polymorphic Worm Detection Using Structural Information of Executables. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Ramkumar Chinchani, Eric van den Berg |
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Eric Totel, Frédéric Majorczyk, Ludovic Mé |
COTS Diversity Based Intrusion Detection and Application to Web Servers. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
COTS diversity, Intrusion detection, anomaly detection, design diversity |
33 | Chris Muelder, Kwan-Liu Ma, Tony Bartoletti |
Interactive Visualization for Network and Port Scan Detection. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
network scans, user interfaces, information visualization, intrusion detection, Network security, port scans |
33 | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song |
Behavioral Distance for Intrusion Detection. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
behavioral distance, Intrusion detection, system call |
33 | Herbert Bos, Kaiming Huang |
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
distributed firewall, network processors |
33 | Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt |
A Specification-Based Intrusion Detection Model for OLSR. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Specification based IDS, MANET, Mobile ad hoc network, Intrusion Detection, Network Security, Constraints, OLSR |
33 | Fanglu Guo, Tzi-cker Chiueh |
Sequence Number-Based MAC Address Spoof Detection. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Wireless LAN MAC spoof detection, WLAN monitoring and intrusion detection, Sequence number |
33 | Ke Wang 0009, Gabriela F. Cretu, Salvatore J. Stolfo |
Anomalous Payload-Based Worm Detection and Signature Generation. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Sufatrio, Roland H. C. Yap |
Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Seung-Sun Hong, Shyhtsun Felix Wu |
On Interactive Internet Traffic Replay. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Michael E. Locasto, Ke Wang 0009, Angelos D. Keromytis, Salvatore J. Stolfo |
FLIPS: Hybrid Adaptive Intrusion Prevention. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Adaptive Response, Intrusion Tolerance, Intrusion Prevention |
33 | Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford |
Virtual Playgrounds for Worm Behavior Investigation. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Intrusion Observation and Analysis, Destructive Experiments, Internet Worms |
Displaying result #601 - #700 of 1618 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|