default search action
8. RAID 2005: Seattle, WA, USA
- Alfonso Valdes, Diego Zamboni:
Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers. Lecture Notes in Computer Science 3858, Springer 2006, ISBN 3-540-31778-3
Worm Detection and Containment (I)
- Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford:
Virtual Playgrounds for Worm Behavior Investigation. 1-21 - Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang:
Empirical Analysis of Rate Limiting Mechanisms. 22-42
Anomaly Detection
- Eric Totel, Frédéric Majorczyk, Ludovic Mé:
COTS Diversity Based Intrusion Detection and Application to Web Servers. 43-62 - Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
Behavioral Distance for Intrusion Detection. 63-81
Intrusion Prevention and Response
- Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo:
FLIPS: Hybrid Adaptive Intrusion Prevention. 82-101 - Herbert Bos, Kaiming Huang:
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. 102-123 - Tadeusz Pietraszek, Chris Vanden Berghe:
Defending Against Injection Attacks Through Context-Sensitive String Evaluation. 124-145
System Call-Based Intrusion Detection
- Sufatrio, Roland H. C. Yap:
Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. 146-164 - Simon P. Chung, Aloysius K. Mok:
On Random-Inspection-Based Intrusion Detection. 165-184 - Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller:
Environment-Sensitive Intrusion Detection. 185-206
Worm Detection and Containment (II)
- Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Polymorphic Worm Detection Using Structural Information of Executables. 207-226 - Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo:
Anomalous Payload-Based Worm Detection and Signature Generation. 227-246
Network-Based Intrusion Detection
- Seung-Sun Hong, Shyhtsun Felix Wu:
On Interactive Internet Traffic Replay. 247-264 - Chris Muelder, Kwan-Liu Ma, Tony Bartoletti:
Interactive Visualization for Network and Port Scan Detection. 265-283 - Ramkumar Chinchani, Eric van den Berg:
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. 284-308
Mobile and Wireless Networks
- Fanglu Guo, Tzi-cker Chiueh:
Sequence Number-Based MAC Address Spoof Detection. 309-329 - Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt:
A Specification-Based Intrusion Detection Model for OLSR. 330-350
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.