The SCEAS System
Navigation Menu

Conferences in DBLP

Recent Advances in Intrusion Detection (RAID) (raid)
2005 (conf/raid/2005)

  1. Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford
    Virtual Playgrounds for Worm Behavior Investigation. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:1-21 [Conf]
  2. Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang
    Empirical Analysis of Rate Limiting Mechanisms. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:22-42 [Conf]
  3. Eric Totel, Frédéric Majorczyk, Ludovic Mé
    COTS Diversity Based Intrusion Detection and Application to Web Servers. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:43-62 [Conf]
  4. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    Behavioral Distance for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:63-81 [Conf]
  5. Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo
    FLIPS: Hybrid Adaptive Intrusion Prevention. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:82-101 [Conf]
  6. Herbert Bos, Kaiming Huang
    Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:102-123 [Conf]
  7. Tadeusz Pietraszek, Chris Vanden Berghe
    Defending Against Injection Attacks Through Context-Sensitive String Evaluation. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:124-145 [Conf]
  8. Sufatrio, Roland H. C. Yap
    Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:146-164 [Conf]
  9. Simon P. Chung, Aloysius K. Mok
    On Random-Inspection-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:165-184 [Conf]
  10. Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller
    Environment-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:185-206 [Conf]
  11. Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna
    Polymorphic Worm Detection Using Structural Information of Executables. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:207-226 [Conf]
  12. Ke Wang, Gabriela Cretu, Salvatore J. Stolfo
    Anomalous Payload-Based Worm Detection and Signature Generation. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:227-246 [Conf]
  13. Seung-Sun Hong, Shyhtsun Felix Wu
    On Interactive Internet Traffic Replay. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:247-264 [Conf]
  14. Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
    Interactive Visualization for Network and Port Scan Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:265-283 [Conf]
  15. Ramkumar Chinchani, Eric van den Berg
    A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:284-308 [Conf]
  16. Fanglu Guo, Tzi-cker Chiueh
    Sequence Number-Based MAC Address Spoof Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:309-329 [Conf]
  17. Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt
    A Specification-Based Intrusion Detection Model for OLSR. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:330-350 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002