The SCEAS System
Navigation Menu

Conferences in DBLP

Detection of Intrusions and Malware & Vulnerability Assessment (dimva)
2008 (conf/dimva/2008)


  1. Data Space Randomization. [Citation Graph (, )][DBLP]


  2. XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. [Citation Graph (, )][DBLP]


  3. VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. [Citation Graph (, )][DBLP]


  4. Dynamic Binary Instrumentation-Based Framework for Malware Defense. [Citation Graph (, )][DBLP]


  5. Embedded Malware Detection Using Markov n-Grams. [Citation Graph (, )][DBLP]


  6. Learning and Classification of Malware Behavior. [Citation Graph (, )][DBLP]


  7. On Race Vulnerabilities in Web Applications. [Citation Graph (, )][DBLP]


  8. On the Limits of Information Flow Techniques for Malware Analysis and Containment. [Citation Graph (, )][DBLP]


  9. Expanding Malware Defense by Securing Software Installations. [Citation Graph (, )][DBLP]


  10. FluXOR: Detecting and Monitoring Fast-Flux Service Networks. [Citation Graph (, )][DBLP]


  11. Traffic Aggregation for Malware Detection. [Citation Graph (, )][DBLP]


  12. The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. [Citation Graph (, )][DBLP]


  13. The Quest for Multi-headed Worms. [Citation Graph (, )][DBLP]


  14. A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002