


default search action
7. RAID 2004: Sophia Antipolis, France
- Erland Jonsson, Alfonso Valdes, Magnus Almgren:

Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings. Lecture Notes in Computer Science 3224, Springer 2004, ISBN 3-540-23123-4
Modelling Process Behaviour
- Lap-Chung Lam, Tzi-cker Chiueh:

Automatic Extraction of Accurate Application-Specific Sandboxing Policy. 1-20 - Haizhi Xu, Wenliang Du, Steve J. Chapin:

Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. 21-38
Detecting Worms and Viruses
- David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen:

HoneyStat: Local Worm Detection Using Honeypots. 39-58 - Stuart E. Schechter, Jaeyeon Jung, Arthur W. Berger:

Fast Detection of Scanning Worm Infections. 59-81 - Ruiqi Hu, Aloysius K. Mok:

Detecting Unknown Massive Mailing Viruses Using Proactive Methods. 82-101
Attack and Alert Analysis
- Tadeusz Pietraszek:

Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. 102-124 - Yi-an Huang, Wenke Lee:

Attack Analysis and Detection for Ad Hoc Routing Protocols. 125-145 - Vinod Yegneswaran, Paul Barford, David Plonka:

On the Design and Use of Internet Sinks for Network Abuse Monitoring. 146-165
Practical Experience
- Jouni Viinikka, Hervé Debar:

Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. 166-187 - Brian Hernacki, Jeremy Bennett, Thomas Lofgren:

Symantec Deception Server Experience with a Commercial Deception System. 188-202
Anomaly Detection
- Ke Wang, Salvatore J. Stolfo:

Anomalous Payload-Based Network Intrusion Detection. 203-222 - Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato:

Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. 223-237 - Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, Hui Zhang:

Seurat: A Pointillist Approach to Anomaly Detection. 238-257
Formal Analysis for Intrusion Detection
- Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman:

Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. 258-277 - Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt:

Formal Reasoning About Intrusion Detection Systems. 278-295 - Ashish Gehani, Gershon Kedem:

RheoStat: Real-Time Risk Management. 296-314

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














