|
Conferences in DBLP
- Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford
Virtual Playgrounds for Worm Behavior Investigation. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:1-21 [Conf]
- Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang
Empirical Analysis of Rate Limiting Mechanisms. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:22-42 [Conf]
- Eric Totel, Frédéric Majorczyk, Ludovic Mé
COTS Diversity Based Intrusion Detection and Application to Web Servers. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:43-62 [Conf]
- Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
Behavioral Distance for Intrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:63-81 [Conf]
- Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo
FLIPS: Hybrid Adaptive Intrusion Prevention. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:82-101 [Conf]
- Herbert Bos, Kaiming Huang
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:102-123 [Conf]
- Tadeusz Pietraszek, Chris Vanden Berghe
Defending Against Injection Attacks Through Context-Sensitive String Evaluation. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:124-145 [Conf]
- Sufatrio, Roland H. C. Yap
Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:146-164 [Conf]
- Simon P. Chung, Aloysius K. Mok
On Random-Inspection-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:165-184 [Conf]
- Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller
Environment-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:185-206 [Conf]
- Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna
Polymorphic Worm Detection Using Structural Information of Executables. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:207-226 [Conf]
- Ke Wang, Gabriela Cretu, Salvatore J. Stolfo
Anomalous Payload-Based Worm Detection and Signature Generation. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:227-246 [Conf]
- Seung-Sun Hong, Shyhtsun Felix Wu
On Interactive Internet Traffic Replay. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:247-264 [Conf]
- Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
Interactive Visualization for Network and Port Scan Detection. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:265-283 [Conf]
- Ramkumar Chinchani, Eric van den Berg
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:284-308 [Conf]
- Fanglu Guo, Tzi-cker Chiueh
Sequence Number-Based MAC Address Spoof Detection. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:309-329 [Conf]
- Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt
A Specification-Based Intrusion Detection Model for OLSR. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:330-350 [Conf]
|