The SCEAS System
Navigation Menu

Conferences in DBLP

Recent Advances in Intrusion Detection (RAID) (raid)
2006 (conf/raid/2006)

  1. James J. Treinen, Ramakrishna Thurimella
    A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:1-18 [Conf]
  2. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    Behavioral Distance Measurement Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:19-40 [Conf]
  3. Jonathon T. Giffin, Somesh Jha, Barton P. Miller
    Automated Discovery of Mimicry Attacks. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:41-60 [Conf]
  4. Simon P. Chung, Aloysius K. Mok
    Allergy Attack Against Automatic Signature Generation. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:61-80 [Conf]
  5. James Newsome, Brad Karp, Dawn Xiaodong Song
    Paragraph: Thwarting Signature Learning by Training Maliciously. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:81-105 [Conf]
  6. Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion
    Anomaly Detector Performance Evaluation Using a Parameterized Environment. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:106-126 [Conf]
  7. Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund M. Clarke, Jeannette M. Wing
    Ranking Attack Graphs. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:127-144 [Conf]
  8. André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer
    Using Hidden Markov Models to Evaluate the Risks of Intrusions. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:145-164 [Conf]
  9. Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling
    The Nepenthes Platform: An Efficient Approach to Collect Malware. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:165-184 [Conf]
  10. Corrado Leita, Marc Dacier, Frédéric Massicotte
    Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:185-205 [Conf]
  11. Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis
    Fast and Evasive Attacks: Highlighting the Challenges Ahead. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:206-225 [Conf]
  12. Ke Wang, Janak J. Parekh, Salvatore J. Stolfo
    Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:226-248 [Conf]
  13. Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt
    DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:249-271 [Conf]
  14. José M. González, Vern Paxson
    Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:272-289 [Conf]
  15. Sushant Sinha, Farnam Jahanian, Jignesh M. Patel
    WIND: Workload-Aware INtrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:290-310 [Conf]
  16. Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomas Hruby, Li Xu, Herbert Bos
    SafeCard: A Gigabit IPS on the Network Card. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:311-330 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002