


default search action
13. RAID 2010: Ottawa, Ontario, Canada
- Somesh Jha, Robin Sommer, Christian Kreibich:

Recent Advances in Intrusion Detection, 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings. Lecture Notes in Computer Science 6307, Springer 2010, ISBN 978-3-642-15511-6
Network Protection
- Irfan Ul Haq

, Sardar Ali, Hassan Khan, Syed Ali Khayam:
What Is the Impact of P2P Traffic on Anomaly Detection? 1-17 - Manos Antonakakis, David Dagon, Xiapu Luo

, Roberto Perdisci, Wenke Lee, Justin Bellmor:
A Centralized Monitoring Infrastructure for Improving DNS Security. 18-37 - Shad Stafford, Jun Li:

Behavior-Based Worm Detectors Compared. 38-57
High Performance
- Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Smith:

Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams. 58-78 - Giorgos Vasiliadis

, Sotiris Ioannidis:
GrAVity: A Massively Parallel Antivirus Engine. 79-96
Malware Detection and Defence
- Abhinav Srivastava, Jonathon T. Giffin:

Automatic Discovery of Parasitic Malware. 97-117 - Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis

, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo:
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. 118-137 - Yunjing Xu, Michael D. Bailey, Eric Vander Weele, Farnam Jahanian:

CANVuS: Context-Aware Network Vulnerability Scanning. 138-157 - Jiang Wang, Angelos Stavrou

, Anup K. Ghosh:
HyperCheck: A Hardware-Assisted Integrity Monitor. 158-177 - Junghwan Rhee, Ryan D. Riley

, Dongyan Xu, Xuxian Jiang:
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. 178-197 - Stefano Ortolani, Cristiano Giuffrida

, Bruno Crispo:
Bait Your Hook: A Novel Detection Technique for Keyloggers. 198-217
Evaluation
- Charles V. Wright, Christopher Connelly, Timothy M. Braje, Jesse C. Rabek, Lee M. Rossey, Robert K. Cunningham:

Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security. 218-237 - Peng Li, Limin Liu, Debin Gao

, Michael K. Reiter:
On Challenges in Evaluating Malware Clustering. 238-255 - Kevin S. Killourhy, Roy A. Maxion:

Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates. 256-276
Forensics
- Paul Giura, Nasir D. Memon

:
NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring. 277-296 - Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro

:
Live and Trustworthy Forensic Analysis of Commodity Production Systems. 297-316 - Kevin A. Roundy

, Barton P. Miller:
Hybrid Analysis and Control of Malware. 317-338
Anomaly Detection
- Jordi Cucurull, Mikael Asplund

, Simin Nadjm-Tehrani:
Anomaly Detection and Mitigation for Disaster Area Networks. 339-359 - Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken:

Community Epidemic Detection Using Time-Correlated Anomalies. 360-381 - Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Shambhu J. Upadhyaya:

A Data-Centric Approach to Insider Attack Detection in Database Systems. 382-401 - Ashish Kamra, Elisa Bertino:

Privilege States Based Access Control for Fine-Grained Intrusion Response. 402-421
Web Security
- Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel:

Abusing Social Networks for Automated User Profiling. 422-441 - Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier

:
An Analysis of Rogue AV Campaigns. 442-463 - Ching-Hsiang Hsu, Chun-Ying Huang

, Kuan-Ta Chen:
Fast-Flux Bot Detection in Real Time. 464-483
Posters
- Luyi Xing, Yuqing Zhang, Shenlong Chen:

A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery. 484-485 - Mohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed:

A Distributed Honeynet at KFUPM: A Case Study. 486-487 - Martin Drasar

, Jan Vykopal
, Radek Krejcí, Pavel Celeda
:
Aspect-Based Attack Detection in Large-Scale Networks. 488-489 - Christian Callegari

, Loris Gazzarrini, Stefano Giordano
, Michele Pagano
, Teresa Pepe:
Detecting Network Anomalies in Backbone Networks. 490-491 - Kui Xu, Qiang Ma, Danfeng (Daphne) Yao

:
Detecting the Onset of Infection for Secure Hosts. 492-493 - Ying Kong, Yuqing Zhang, Qixu Liu:

Eliminating Human Specification in Static Analysis. 494-495 - Hosoi Takurou, Kanta Matsuura

:
Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009. 496-497 - Yipeng Wang, Zhibin Zhang, Li Guo:

Inferring Protocol State Machine from Real-World Trace. 498-499 - Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel

:
MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. 500-501 - Jianchun Jiang, Weifeng Chen, Liping Ding:

On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach. 502-504 - Robert Koch, Gabi Dreo Rodosek:

Security System for Encrypted Environments (S2E2). 505-507 - Serguei A. Mokhov

, Joey Paquet, Mourad Debbabi
:
Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence. 508-509 - Salman Niksefat, Mohammad Mehdi Ahaniha, Babak Sadeghiyan, Mehdi Shajari:

Toward Specification-Based Intrusion Detection for Web Applications. 510-511 - Ryan Whelan, David R. Kaeli:

Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices. 512-513 - FuYong Zhang, DeYu Qi, JingLin Hu:

Using IRP for Malware Detection. 514-515

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














