|
Conferences in DBLP
- Kwong H. Yung
Detecting Long Connection Chains of Interactive Terminal Sessions. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:1-16 [Conf]
- David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:17-35 [Conf]
- Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:36-53 [Conf]
- Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:54-73 [Conf]
- Peng Ning, Yun Cui, Douglas S. Reeves
Analyzing Intensive Intrusion Alerts via Correlation. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:74-94 [Conf]
- Phillip A. Porras, Martin W. Fong, Alfonso Valdes
A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:95-114 [Conf]
- Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé
M2D2: A Formal Data Model for IDS Alert Correlation. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:115-127 [Conf]
- Steven R. Johnston
Development of a Legal Framework for Intrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:138-157 [Conf]
- James E. Just, James C. Reynolds, Larry A. Clough, Melissa Danforth, Karl N. Levitt, Ryan Maglich, Jeff Rowe
Learning Unknown Attacks - A Start. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:158-176 [Conf]
- Hervé Debar, Benjamin Morin
Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:177-198 [Conf]
- Robert P. Goldman
A Stochastic Model for Intrusions. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:199-218 [Conf]
- Vladimir I. Gorodetski, Igor V. Kotenko
Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:219-238 [Conf]
- Mike Hall, Kevin Wiley
Capacity Verification for High Speed Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:239-251 [Conf]
- Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang
Performance Adaptation in Real-Time Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:252-273 [Conf]
- Thomas Toth, Christopher Krügel
Accurate Buffer Overflow Detection via Abstract Payload Execution. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:274-291 [Conf]
- Jacob Zimmermann, Ludovic Mé, Christophe Bidan
Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:292-306 [Conf]
- Richard Lippmann, Seth E. Webster, Douglas Stetson
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:307-326 [Conf]
|