The SCEAS System
Navigation Menu

Conferences in DBLP

Detection of Intrusions and Malware & Vulnerability Assessment (dimva)
2005 (conf/dimva/2005)

  1. Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia
    Analyzing Memory Accesses in Obfuscated x86 Executables. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:1-18 [Conf]
  2. Udo Payer, Peter Teufl, Mario Lamberger
    Hybrid Engine for Polymorphic Shellcode Detection. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:19-31 [Conf]
  3. Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong
    Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:32-50 [Conf]
  4. Fabien Pouget, Thorsten Holz
    A Pointillist Approach for Comparing Honeypots. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:51-68 [Conf]
  5. Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
    Automatic Detection of Attacks on Cryptographic Protocols: A Case Study. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:69-84 [Conf]
  6. Ulf Larson, Emilie Lundin Barse, Erland Jonsson
    METAL - A Tool for Extracting Attack Manifestations. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:85-102 [Conf]
  7. Thomas Dübendorfer, Arno Wagner, Theus Hossmann, Bernhard Plattner
    Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:103-122 [Conf]
  8. Fredrik Valeur, Darren Mutz, Giovanni Vigna
    A Learning-Based Approach to the Detection of SQL Attacks. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:123-140 [Conf]
  9. Mario Latendresse
    Masquerade Detection via Customized Grammars. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:141-159 [Conf]
  10. Suraiya Khan, Issa Traoré
    A Prevention Model for Algorithmic Complexity Attacks. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:160-173 [Conf]
  11. Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
    Detecting Malicious Code by Model Checking. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:174-187 [Conf]
  12. Michael Meier, Sebastian Schmerl, Hartmut König
    Improving the Efficiency of Misuse Detection. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:188-205 [Conf]
  13. Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer
    Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:206-221 [Conf]
  14. Seung-Sun Hong, Fiona Wong, Shyhtsun Felix Wu, Bjorn Lilja, Tony Y. Yohansson, Henric Johnson, Ame Nelsson
    TCPtransform: Property-Oriented TCP Traffic Transformation. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:222-240 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002