The SCEAS System
Navigation Menu

Conferences in DBLP

Recent Advances in Intrusion Detection (RAID) (raid)
2002 (conf/raid/2002)

  1. Kwong H. Yung
    Detecting Long Connection Chains of Interactive Terminal Sessions. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:1-16 [Conf]
  2. David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford
    Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:17-35 [Conf]
  3. Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo
    Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:36-53 [Conf]
  4. Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion
    Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:54-73 [Conf]
  5. Peng Ning, Yun Cui, Douglas S. Reeves
    Analyzing Intensive Intrusion Alerts via Correlation. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:74-94 [Conf]
  6. Phillip A. Porras, Martin W. Fong, Alfonso Valdes
    A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:95-114 [Conf]
  7. Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé
    M2D2: A Formal Data Model for IDS Alert Correlation. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:115-127 [Conf]
  8. Steven R. Johnston
    Development of a Legal Framework for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:138-157 [Conf]
  9. James E. Just, James C. Reynolds, Larry A. Clough, Melissa Danforth, Karl N. Levitt, Ryan Maglich, Jeff Rowe
    Learning Unknown Attacks - A Start. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:158-176 [Conf]
  10. Hervé Debar, Benjamin Morin
    Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:177-198 [Conf]
  11. Robert P. Goldman
    A Stochastic Model for Intrusions. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:199-218 [Conf]
  12. Vladimir I. Gorodetski, Igor V. Kotenko
    Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:219-238 [Conf]
  13. Mike Hall, Kevin Wiley
    Capacity Verification for High Speed Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:239-251 [Conf]
  14. Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang
    Performance Adaptation in Real-Time Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:252-273 [Conf]
  15. Thomas Toth, Christopher Krügel
    Accurate Buffer Overflow Detection via Abstract Payload Execution. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:274-291 [Conf]
  16. Jacob Zimmermann, Ludovic Mé, Christophe Bidan
    Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:292-306 [Conf]
  17. Richard Lippmann, Seth E. Webster, Douglas Stetson
    The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:307-326 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002