|
Conferences in DBLP
- Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia
Analyzing Memory Accesses in Obfuscated x86 Executables. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:1-18 [Conf]
- Udo Payer, Peter Teufl, Mario Lamberger
Hybrid Engine for Polymorphic Shellcode Detection. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:19-31 [Conf]
- Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:32-50 [Conf]
- Fabien Pouget, Thorsten Holz
A Pointillist Approach for Comparing Honeypots. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:51-68 [Conf]
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Automatic Detection of Attacks on Cryptographic Protocols: A Case Study. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:69-84 [Conf]
- Ulf Larson, Emilie Lundin Barse, Erland Jonsson
METAL - A Tool for Extracting Attack Manifestations. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:85-102 [Conf]
- Thomas Dübendorfer, Arno Wagner, Theus Hossmann, Bernhard Plattner
Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:103-122 [Conf]
- Fredrik Valeur, Darren Mutz, Giovanni Vigna
A Learning-Based Approach to the Detection of SQL Attacks. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:123-140 [Conf]
- Mario Latendresse
Masquerade Detection via Customized Grammars. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:141-159 [Conf]
- Suraiya Khan, Issa Traoré
A Prevention Model for Algorithmic Complexity Attacks. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:160-173 [Conf]
- Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
Detecting Malicious Code by Model Checking. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:174-187 [Conf]
- Michael Meier, Sebastian Schmerl, Hartmut König
Improving the Efficiency of Misuse Detection. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:188-205 [Conf]
- Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer
Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:206-221 [Conf]
- Seung-Sun Hong, Fiona Wong, Shyhtsun Felix Wu, Bjorn Lilja, Tony Y. Yohansson, Henric Johnson, Ame Nelsson
TCPtransform: Property-Oriented TCP Traffic Transformation. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:222-240 [Conf]
|