


default search action
8. RAID 2005: Seattle, WA, USA
- Alfonso Valdes, Diego Zamboni:

Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers. Lecture Notes in Computer Science 3858, Springer 2006, ISBN 3-540-31778-3
Worm Detection and Containment (I)
- Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford:

Virtual Playgrounds for Worm Behavior Investigation. 1-21 - Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang:

Empirical Analysis of Rate Limiting Mechanisms. 22-42
Anomaly Detection
- Eric Totel, Frédéric Majorczyk, Ludovic Mé:

COTS Diversity Based Intrusion Detection and Application to Web Servers. 43-62 - Debin Gao

, Michael K. Reiter, Dawn Xiaodong Song:
Behavioral Distance for Intrusion Detection. 63-81
Intrusion Prevention and Response
- Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo:

FLIPS: Hybrid Adaptive Intrusion Prevention. 82-101 - Herbert Bos

, Kaiming Huang:
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. 102-123 - Tadeusz Pietraszek, Chris Vanden Berghe:

Defending Against Injection Attacks Through Context-Sensitive String Evaluation. 124-145
System Call-Based Intrusion Detection
- Sufatrio, Roland H. C. Yap:

Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. 146-164 - Simon P. Chung, Aloysius K. Mok:

On Random-Inspection-Based Intrusion Detection. 165-184 - Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller:

Environment-Sensitive Intrusion Detection. 185-206
Worm Detection and Containment (II)
- Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:

Polymorphic Worm Detection Using Structural Information of Executables. 207-226 - Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo:

Anomalous Payload-Based Worm Detection and Signature Generation. 227-246
Network-Based Intrusion Detection
- Seung-Sun Hong, Shyhtsun Felix Wu:

On Interactive Internet Traffic Replay. 247-264 - Chris Muelder, Kwan-Liu Ma, Tony Bartoletti:

Interactive Visualization for Network and Port Scan Detection. 265-283 - Ramkumar Chinchani, Eric van den Berg:

A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. 284-308
Mobile and Wireless Networks
- Fanglu Guo, Tzi-cker Chiueh:

Sequence Number-Based MAC Address Spoof Detection. 309-329 - Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt:

A Specification-Based Intrusion Detection Model for OLSR. 330-350

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














