The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RAID with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1986-1991 (15) 1992-1993 (17) 1994-1995 (30) 1996-1997 (20) 1998-1999 (52) 2000 (32) 2001 (27) 2002 (33) 2003 (41) 2004 (44) 2005 (55) 2006 (54) 2007 (66) 2008 (79) 2009 (82) 2010 (71) 2011 (63) 2012 (66) 2013 (72) 2014 (64) 2015 (80) 2016 (70) 2017 (57) 2018 (84) 2019 (72) 2020 (62) 2021 (61) 2022 (55) 2023 (87) 2024 (7)
Publication types (Num. hits)
article(327) book(1) incollection(4) inproceedings(1252) phdthesis(7) proceedings(27)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 668 occurrences of 366 keywords

Results
Found 1659 publication records. Showing 1618 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
33Asaf Shabtai, Uri Kanonov, Yuval Elovici Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF KBTA, Host-Based Intrusion Detection Systems, Mobile Devices
33Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee BLADE: Slashing the Invisible Channel of Drive-by Download Malware. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh Automatic Generation of String Signatures for Malware Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation
33Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo Brave New World: Pervasive Insecurity of Embedded Network Devices. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Router insecurity, network webcams, print servers, embedded device management interface exploitation, default password
33Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF self-update, anomaly detection, self-calibrate, sanitization
33Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel Automatic Software Instrumentation for the Detection of Non-control-data Attacks. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack classification, anomaly-based intrusion detection systems
33Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna Protecting a Moving Target: Addressing Web Application Concept Drift. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Machine Learning, Anomaly Detection, Concept Drift, Web Application Security
33Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras ALICE@home: Distributed Framework for Detecting Malicious Sites. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Grégoire Jacob, Hervé Debar, Eric Filiol Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Interpretation, Malware, Behaviors, Attribute-Grammars
33Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq Using Formal Grammar and Genetic Operators to Evolve Malware. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Richard Lippmann, Engin Kirda, Ari Trachtenberg (eds.) Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Sean McAllister, Engin Kirda, Christopher Kruegel Leveraging User Interactions for In-Depth Testing of Web Applications. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malicious users, detection, insider threat, misuse
33Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar Evading Anomaly Detection through Variance Injection Attacks on PCA. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Junsup Lee, Sung Deok Cha Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF detector placement, Intrusion detection, Bayesian networks, attack graph
33Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 Countering Persistent Kernel Rootkits through Systematic Hook Discovery. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia Model-Based Covert Timing Channels: Automated Modeling and Evasion. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF traffic modeling, evasion, covert timing channels
33Daniel Ramsbrock, Xinyuan Wang 0005, Xuxian Jiang A First Step towards Live Botmaster Traceback. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Abhinav Srivastava, Jonathon T. Giffin Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machine introspection, attack prevention, Firewall
33Natalia Stakhanova, Chris Strasburg, Samik Basu 0001, Johnny S. Wong On Evaluation of Response Cost for Intrusion Response Systems. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33M. Patrick Collins, Michael K. Reiter On the Limits of Payload-Oblivious Network Attack Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evaluation, network intrusion detection, ROC curve
33Wei Lu 0018, Ali A. Ghorbani 0001 Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis Gnort: High Performance Network Intrusion Detection Using Graphics Processors. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD
33Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier Automating the Analysis of Honeypot Data (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internet threats analysis, malicious behavior characterization, Honeypots
33Mohamed Nassar 0001, Radu State, Olivier Festor Monitoring SIP Traffic Using Support Vector Machines. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Lorenzo Cavallaro, R. Sekar 0001 Anomalous Taint Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez 0001, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan Anticipating Hidden Text Salting in Emails. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Nathalie Dagorn WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web application, Anomaly detection, Correlation
33Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh A Study of the Packer Problem and Its Solutions. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer Predicting the Resource Consumption of Network Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Simon P. Chung, Aloysius K. Mok Swarm Attacks against Network-Level Emulation/Analysis. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Decoder detection, network-level emulation, swarm attacks, network IDS, evasion
33Ashish Kamra, Elisa Bertino Database Intrusion Detection and Response. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Humberto J. Abdelnur, Radu State, Olivier Festor Advanced Network Fingerprinting. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Passive Fingerprinting, Structural syntax inference, Feature extraction
33Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin System Call API Obfuscation (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collaboration, Dynamic Programming, Worms, Control Theory
33Ryan D. Riley, Xuxian Jiang, Dongyan Xu Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek Improving Anomaly Detection Error Rate by Collective Trust Modeling. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Kevin S. Killourhy, Roy A. Maxion The Effect of Clock Resolution on Keystroke Dynamics. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Insider-attack detection, Digital biometrics, Anomaly detection, Keystroke dynamics
33Andrew Brown 0005, Mark Ryan 0001 Monitoring the Execution of Third-Party Software on Mobile Devices. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Paul Rubel, Partha P. Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Divya Jain, K. Vasanta Lakshmi, Priti Shankar Deep Packet Inspection Using Message Passing Networks. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Nabil Schear, David R. Albrecht, Nikita Borisov High-Speed Matching of Vulnerability Signatures. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell A Layered Architecture for Detecting Malicious Behaviors. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dynamic, Malware, Behavior, Data-Flow, Semantic Gap
33Magnus Almgren, Ulf Lindqvist, Erland Jonsson A Multi-Sensor Model to Improve Automated Attack Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF alert reasoning, intrusion detection
33Christopher Krügel, Richard Lippmann, Andrew J. Clark (eds.) Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Jeffrey Wilhelm, Tzi-cker Chiueh A Forced Sampled Execution Approach to Kernel Rootkit Identification. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection
33Marcus A. Maloof, Gregory D. Stephens elicit: A System for Detecting Insiders Who Violate Need-to-Know. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly detection, insider threat, misuse
33Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Kenneth L. Ingham, Hajime Inoue Comparing Anomaly Detection Techniques for HTTP. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hypertext transport protocol, Intrusion detection, Anomaly detection, HTTP, Comparison
33Federico Maggi, Stefano Zanero On the Use of Different Statistical Tests for Alert Correlation - Short Paper. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33John R. Lange, Peter A. Dinda, Fabián E. Bustamante Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF volunteer systems, honeypots, honeynets, wormholes
33Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario Automated Classification and Analysis of Internet Malware. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Matthias Vallentin, Robin Sommer, Jason Lee 0001, Craig Leres, Vern Paxson, Brian Tierney The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Simon P. Chung, Aloysius K. Mok Advanced Allergy Attacks: Does a Corpus Really Help? Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Automatic Signature Generation, Allergy Attacks, Intrusion Prevention Systems
33Xuxian Jiang, Xinyuan Wang 0005 "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Response Agent (RA), Topology Dependency Index (TDI), Attack Damage Index (ADI), adaptive isolation, attack damage, response cost, MANET
33Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web Attacks, Anomaly Detection, Dynamic Analysis, Code Instrumentation
33Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers Alert Verification Evasion Through Server Response Forging. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Alert Verification, Network Intrusion Detection, Exploits, Evasion
33Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer Exploiting Execution Context for the Detection of Anomalous System Calls. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF System Call Argument Analysis, Execution Context, Intrusion Detection
33M. Patrick Collins, Michael K. Reiter Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly detection, Graph analysis, Large networks
33Zhuowei Li 0001, XiaoFeng Wang 0001, Jong Youl Choi SpyShield: Preserving Privacy from Spy Add-Ons. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Monirul Islam Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee Understanding Precision in Host Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly detection, Program models, Formal analysis
33Alfonso Valdes, Diego Zamboni (eds.) Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Diego Zamboni, Christopher Krügel (eds.) Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Simon P. Chung, Aloysius K. Mok Allergy Attack Against Automatic Signature Generation. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Automatic Signature Generation, Adaptive Response, Intrusion Prevention
33James Newsome, Brad Karp, Dawn Xiaodong Song Paragraph: Thwarting Signature Learning by Training Maliciously. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Corrado Leita, Marc Dacier, Frédéric Massicotte Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DEMEM, TBRPF, attack method, MPR selector, Hello message, TC message, ID message, ID Manager, ID-Evidence, ID-Forward, ID-Request, MANET, constraint, IDS, AODV, evidence, DSR, OLSR, forwarder, TESLA, MPR
33Ke Wang 0009, Janak J. Parekh, Salvatore J. Stolfo Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling The Nepenthes Platform: An Efficient Approach to Collect Malware. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Jonathon T. Giffin, Somesh Jha, Barton P. Miller Automated Discovery of Mimicry Attacks. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IDS evaluation, model-based anomaly detection, model checking, attacks
33James J. Treinen, Ramakrishna Thurimella A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data Mining, Intrusion Detection, Association Rules, Graph Algorithms
33André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer Using Hidden Markov Models to Evaluate the Risks of Intrusions. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hidden Markov modeling, Intrusion detection, Risk assessment
33Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis Fast and Evasive Attacks: Highlighting the Challenges Ahead. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Worms, Network Security, Network Monitoring, Invasive Software
33Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu 0001, Edmund M. Clarke, Jeannette M. Wing Ranking Attack Graphs. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Google PageRank, Model Checking, security metric, Attack Graph, Attack Model
33Sushant Sinha, Farnam Jahanian, Jignesh M. Patel WIND: Workload-Aware INtrusion Detection. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF workload aware, adaptive algorithm, deep packet inspection, Intrusion detection and prevention
33Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion Anomaly Detector Performance Evaluation Using a Parameterized Environment. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Debin Gao, Michael K. Reiter, Dawn Xiaodong Song Behavioral Distance Measurement Using Hidden Markov Models. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF behavioral distance, intrusion detection, anomaly detection, system call
33Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomás Hrubý, Li Xu, Herbert Bos SafeCard: A Gigabit IPS on the Network Card. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33José M. González, Vern Paxson Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Tadeusz Pietraszek, Chris Vanden Berghe Defending Against Injection Attacks Through Context-Sensitive String Evaluation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Simon P. Chung, Aloysius K. Mok On Random-Inspection-Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random inspection, intrusion detection, computer security, Mimicry attacks
33Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna Polymorphic Worm Detection Using Structural Information of Executables. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Ramkumar Chinchani, Eric van den Berg A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Eric Totel, Frédéric Majorczyk, Ludovic Mé COTS Diversity Based Intrusion Detection and Application to Web Servers. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COTS diversity, Intrusion detection, anomaly detection, design diversity
33Chris Muelder, Kwan-Liu Ma, Tony Bartoletti Interactive Visualization for Network and Port Scan Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network scans, user interfaces, information visualization, intrusion detection, Network security, port scans
33Debin Gao, Michael K. Reiter, Dawn Xiaodong Song Behavioral Distance for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF behavioral distance, Intrusion detection, system call
33Herbert Bos, Kaiming Huang Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed firewall, network processors
33Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt A Specification-Based Intrusion Detection Model for OLSR. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Specification based IDS, MANET, Mobile ad hoc network, Intrusion Detection, Network Security, Constraints, OLSR
33Fanglu Guo, Tzi-cker Chiueh Sequence Number-Based MAC Address Spoof Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Wireless LAN MAC spoof detection, WLAN monitoring and intrusion detection, Sequence number
33Ke Wang 0009, Gabriela F. Cretu, Salvatore J. Stolfo Anomalous Payload-Based Worm Detection and Signature Generation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Sufatrio, Roland H. C. Yap Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Seung-Sun Hong, Shyhtsun Felix Wu On Interactive Internet Traffic Replay. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Michael E. Locasto, Ke Wang 0009, Angelos D. Keromytis, Salvatore J. Stolfo FLIPS: Hybrid Adaptive Intrusion Prevention. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Adaptive Response, Intrusion Tolerance, Intrusion Prevention
33Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford Virtual Playgrounds for Worm Behavior Investigation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion Observation and Analysis, Destructive Experiments, Internet Worms
Displaying result #601 - #700 of 1618 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license