The SCEAS System
Navigation Menu

Conferences in DBLP

Recent Advances in Intrusion Detection (RAID) (raid)
2007 (conf/raid/2007)

  1. Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer
    Exploiting Execution Context for the Detection of Anomalous System Calls. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:1-20 [Conf]
  2. Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee
    Understanding Precision in Host Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:21-41 [Conf]
  3. Kenneth L. Ingham, Hajime Inoue
    Comparing Anomaly Detection Techniques for HTTP. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:42-62 [Conf]
  4. Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna
    Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:63-86 [Conf]
  5. Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
    Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:87-106 [Conf]
  6. Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney
    The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:107-126 [Conf]
  7. Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matthew Bishop
    Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:127-145 [Conf]
  8. Marcus A. Maloof, Gregory D. Stephens
    elicit: A System for Detecting Insiders Who Violate Need-to-Know. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:146-166 [Conf]
  9. Federico Maggi, Stefano Zanero
    On the Use of Different Statistical Tests for Alert Correlation - Short Paper. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:167-177 [Conf]
  10. Michael Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario
    Automated Classification and Analysis of Internet Malware. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:178-197 [Conf]
  11. Xuxian Jiang, Xinyuan Wang
    "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:198-218 [Conf]
  12. Jeffrey Wilhelm, Tzi-cker Chiueh
    A Forced Sampled Execution Approach to Kernel Rootkit Identification. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:219-235 [Conf]
  13. Simon P. Chung, Aloysius K. Mok
    Advanced Allergy Attacks: Does a Corpus Really Help? [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:236-255 [Conf]
  14. Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers
    Alert Verification Evasion Through Server Response Forging. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:256-275 [Conf]
  15. M. Patrick Collins, Michael K. Reiter
    Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:276-295 [Conf]
  16. Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
    SpyShield: Preserving Privacy from Spy Add-Ons. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:296-316 [Conf]
  17. John R. Lange, Peter A. Dinda, Fabián E. Bustamante
    Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:317-336 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002