


default search action
10. RAID 2007: Gold Goast, Queensland, Australia
- Christopher Krügel, Richard Lippmann, Andrew J. Clark:

Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings. Lecture Notes in Computer Science 4637, Springer 2007, ISBN 978-3-540-74319-4
Host-Based Intrusion Detection
- Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer:

Exploiting Execution Context for the Detection of Anomalous System Calls. 1-20 - Monirul Islam Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee:

Understanding Precision in Host Based Intrusion Detection. 21-41
Anomaly-Based Intrusion Detection
- Kenneth L. Ingham, Hajime Inoue:

Comparing Anomaly Detection Techniques for HTTP. 42-62 - Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna:

Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. 63-86
Network-Based Intrusion Detection and Response
- Michalis Polychronakis, Kostas G. Anagnostakis

, Evangelos P. Markatos:
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. 87-106 - Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney:

The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. 107-126 - Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop

:
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. 127-145
Insider Detection and Alert Correlation
- Marcus A. Maloof, Gregory D. Stephens:

elicit: A System for Detecting Insiders Who Violate Need-to-Know. 146-166 - Federico Maggi, Stefano Zanero:

On the Use of Different Statistical Tests for Alert Correlation - Short Paper. 167-177
Malicious Code Analysis
- Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario:

Automated Classification and Analysis of Internet Malware. 178-197 - Xuxian Jiang, Xinyuan Wang:

"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. 198-218 - Jeffrey Wilhelm, Tzi-cker Chiueh:

A Forced Sampled Execution Approach to Kernel Rootkit Identification. 219-235
Evasion
- Simon P. Chung, Aloysius K. Mok:

Advanced Allergy Attacks: Does a Corpus Really Help? 236-255 - Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers:

Alert Verification Evasion Through Server Response Forging. 256-275
Malicious Code Defense
- M. Patrick Collins, Michael K. Reiter:

Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. 276-295 - Zhuowei Li, XiaoFeng Wang, Jong Youl Choi:

SpyShield: Preserving Privacy from Spy Add-Ons. 296-316 - John R. Lange, Peter A. Dinda, Fabián E. Bustamante:

Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. 317-336

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














