|
Conferences in DBLP
A Case Study on Asprox Infection Dynamics. [Citation Graph (, )][DBLP]
How Good Are Malware Detectors at Remediating Infected Systems?. [Citation Graph (, )][DBLP]
Towards Proactive Spam Filtering (Extended Abstract). [Citation Graph (, )][DBLP]
Shepherding Loadable Kernel Modules through On-demand Emulation. [Citation Graph (, )][DBLP]
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. [Citation Graph (, )][DBLP]
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. [Citation Graph (, )][DBLP]
Polymorphing Software by Randomizing Data Structure Layout. [Citation Graph (, )][DBLP]
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. [Citation Graph (, )][DBLP]
Using Contextual Information for IDS Alarm Classification (Extended Abstract). [Citation Graph (, )][DBLP]
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. [Citation Graph (, )][DBLP]
A Service Dependency Modeling Framework for Policy-Based Response Enforcement. [Citation Graph (, )][DBLP]
Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract). [Citation Graph (, )][DBLP]
Selecting and Improving System Call Models for Anomaly Detection. [Citation Graph (, )][DBLP]
|