|
Conferences in DBLP
- James J. Treinen, Ramakrishna Thurimella
A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:1-18 [Conf]
- Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
Behavioral Distance Measurement Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:19-40 [Conf]
- Jonathon T. Giffin, Somesh Jha, Barton P. Miller
Automated Discovery of Mimicry Attacks. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:41-60 [Conf]
- Simon P. Chung, Aloysius K. Mok
Allergy Attack Against Automatic Signature Generation. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:61-80 [Conf]
- James Newsome, Brad Karp, Dawn Xiaodong Song
Paragraph: Thwarting Signature Learning by Training Maliciously. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:81-105 [Conf]
- Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion
Anomaly Detector Performance Evaluation Using a Parameterized Environment. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:106-126 [Conf]
- Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund M. Clarke, Jeannette M. Wing
Ranking Attack Graphs. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:127-144 [Conf]
- André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer
Using Hidden Markov Models to Evaluate the Risks of Intrusions. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:145-164 [Conf]
- Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling
The Nepenthes Platform: An Efficient Approach to Collect Malware. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:165-184 [Conf]
- Corrado Leita, Marc Dacier, Frédéric Massicotte
Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:185-205 [Conf]
- Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis
Fast and Evasive Attacks: Highlighting the Challenges Ahead. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:206-225 [Conf]
- Ke Wang, Janak J. Parekh, Salvatore J. Stolfo
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:226-248 [Conf]
- Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:249-271 [Conf]
- José M. González, Vern Paxson
Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:272-289 [Conf]
- Sushant Sinha, Farnam Jahanian, Jignesh M. Patel
WIND: Workload-Aware INtrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:290-310 [Conf]
- Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomas Hruby, Li Xu, Herbert Bos
SafeCard: A Gigabit IPS on the Network Card. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:311-330 [Conf]
|