The SCEAS System
Navigation Menu

Conferences in DBLP

Detection of Intrusions and Malware & Vulnerability Assessment (dimva)
2004 (conf/dimva/2004)

  1. Tobias Chyssler, Stefan Burschka, Michael Semling, Tomas Lingvall, Kalle Burbeck
    Alarm Reduction and Correlation in Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:9-24 [Conf]
  2. Christopher Krügel, William K. Robertson
    Alert Verification Determining the Success of Intrusion Attempts. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:25-38 [Conf]
  3. Marko Jahnke, Martin Lies, Sven Henkel, Michael Bussmann, Jens Tölle
    Komponenten für kooperative Intrusion-Detection in dynamischen Koalitionsumgebungen. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:39-53 [Conf]
  4. Peter Herrmann, Lars Wiebusch, Heiko Krumm
    Vertrauensbasierte Laufzeitüberwachung verteilter komponentenstrukturierter E-Commerce-Software. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:55-70 [Conf]
  5. Pavel Laskov, Christin Schäfer, Igor V. Kotenko
    Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:71-82 [Conf]
  6. Frank Kargl, Andreas Klenk, Michael Weber, Stefan Schlott
    Sensors for Detection of Misbehaving Nodes in MANETs. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:83-97 [Conf]
  7. Joerg Abendroth
    Aktive Strategien zur Schutzzielverletzungserkennung durch eine kontrollierte Machtteilung in der Zugriffskontrollarchitektur. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:99-112 [Conf]
  8. Helmut Reiser, Gereon Volker
    A Honeynet within the German Research Network - Experiences and Results. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:113-128 [Conf]
  9. Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz
    Ermittlung von Verwundbarkeiten mit elektronischen Ködern. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:129-141 [Conf]
  10. Shai Rubin, Ian D. Alderman, David W. Parter, Mary K. Vernon
    Foundations for Intrusion Prevention. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:143-160 [Conf]
  11. Halvar Flake
    Structural Comparison of Executable Objects. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:161-173 [Conf]
  12. Marc Schönefeld
    Anti-Patterns in JDK Security and Refactorings. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:175-186 [Conf]
  13. Teobaldo A. Dantas de Medeiros, Paulo S. Motta Pires
    LIV - The Linux Integrated Viruswall. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:187-200 [Conf]
  14. Heiko Fangmeier, Michel Messerschmidt, Fabian Müller, Jan Seedorf
    Risiken der Nichterkennung von Malware in komprimierter Form. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:201-211 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002