


default search action
9. RAID 2006: Hamburg, Germany
- Diego Zamboni, Christopher Krügel:

Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings. Lecture Notes in Computer Science 4219, Springer 2006, ISBN 3-540-39723-X
Anomaly Detection
- James J. Treinen, Ramakrishna Thurimella:

A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures. 1-18 - Debin Gao

, Michael K. Reiter, Dawn Xiaodong Song:
Behavioral Distance Measurement Using Hidden Markov Models. 19-40
Attacks
- Jonathon T. Giffin, Somesh Jha, Barton P. Miller:

Automated Discovery of Mimicry Attacks. 41-60 - Simon P. Chung, Aloysius K. Mok:

Allergy Attack Against Automatic Signature Generation. 61-80 - James Newsome, Brad Karp, Dawn Xiaodong Song:

Paragraph: Thwarting Signature Learning by Training Maliciously. 81-105
System Evaluation and Threat Assessment
- Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion:

Anomaly Detector Performance Evaluation Using a Parameterized Environment. 106-126 - Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund M. Clarke, Jeannette M. Wing:

Ranking Attack Graphs. 127-144 - André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer:

Using Hidden Markov Models to Evaluate the Risks of Intrusions. 145-164
Malware Collection and Analysis
- Paul Baecher, Markus Koetter, Thorsten Holz

, Maximillian Dornseif, Felix C. Freiling:
The Nepenthes Platform: An Efficient Approach to Collect Malware. 165-184 - Corrado Leita, Marc Dacier, Frédéric Massicotte:

Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. 185-205 - Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis:

Fast and Evasive Attacks: Highlighting the Challenges Ahead. 206-225
Anomaly- and Specification-Based Detection
- Ke Wang, Janak J. Parekh, Salvatore J. Stolfo:

Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. 226-248 - Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt:

DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. 249-271
Network Intrusion Detection
- José M. González, Vern Paxson:

Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. 272-289 - Sushant Sinha, Farnam Jahanian, Jignesh M. Patel:

WIND: Workload-Aware INtrusion Detection. 290-310 - Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomás Hrubý, Li Xu, Herbert Bos:

SafeCard: A Gigabit IPS on the Network Card. 311-330

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














