


default search action
12. RAID 2009: Saint-Malo, France
- Engin Kirda, Somesh Jha, Davide Balzarotti:

Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Lecture Notes in Computer Science 5758, Springer 2009, ISBN 978-3-642-04341-3
Recent Advances in Intrusion Detection Anomaly and Specification-Based Approaches
- Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel

:
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. 1-20 - Federico Maggi

, William K. Robertson, Christopher Krügel, Giovanni Vigna:
Protecting a Moving Target: Addressing Web Application Concept Drift. 21-40 - Gabriela F. Cretu-Ciocarlie, Angelos Stavrou

, Michael E. Locasto, Salvatore J. Stolfo:
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. 41-60 - Martin Rehák, Eugen Staab, Volker Fusenig, Michal Pechoucek

, Martin Grill, Jan Stiborek
, Karel Bartos, Thomas Engel:
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. 61-80
Malware Detection and Prevention (I)
- Grégoire Jacob, Hervé Debar

, Eric Filiol
:
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. 81-100 - Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh:

Automatic Generation of String Signatures for Malware Detection. 101-120 - M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza

, Muddassar Farooq:
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. 121-141
Network and Host Intrusion Detection and Prevention
- Peng Li, Debin Gao

, Michael K. Reiter:
Automatically Adapting a Trained Anomaly Detector to Software Patches. 142-160 - Juan Caballero, Zhenkai Liang

, Pongsin Poosankam, Dawn Song:
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. 161-181 - Jérôme François

, Humberto J. Abdelnur, Radu State, Olivier Festor
:
Automated Behavioral Fingerprinting. 182-201
Intrusion Detection for Mobile Devices
- Guanhua Yan, Stephan J. Eidenbenz

, Emanuele Galli:
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. 202-223 - Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq:

Keystroke-Based User Identification on Smart Phones. 224-243 - Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen:

VirusMeter: Preventing Your Cellphone from Spies. 244-264
High-Performance Intrusion Detection
- Giorgos Vasiliadis

, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis:
Regular Expression Matching on Graphics Hardware for Intrusion Detection. 265-283 - Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha:

Multi-byte Regular Expression Matching with Speculation. 284-303
Malware Detection and Prevention (II)
- Chaoting Xuan, John A. Copeland, Raheem A. Beyah

:
Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. 304-325 - Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki:

Exploiting Temporal Persistence to Detect Covert Botnet Channels. 326-345
Posters
- Yang Li, Li Guo, Binxing Fang, Xiangtao Liu, Lin Qi:

An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. 346-347 - Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel

:
Automatic Software Instrumentation for the Detection of Non-control-data Attacks. 348-349 - Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:

BLADE: Slashing the Invisible Channel of Drive-by Download Malware. 350-352 - Milosz Marian Hulboj, Ryszard Erazm Jurga:

CERN Investigation of Network Behaviour and Anomaly Detection. 353-354 - Laurent George, Valérie Viet Triem Tong, Ludovic Mé:

Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. 355-356 - Asaf Shabtai, Uri Kanonov, Yuval Elovici:

Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. 357-358 - Wei Wang, Thomas Guyet

, Svein J. Knapskog:
Autonomic Intrusion Detection System. 359-361 - Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras:

ALICE@home: Distributed Framework for Detecting Malicious Sites. 362-364 - Frédéric Massicotte:

Packet Space Analysis of Intrusion Detection Signatures. 365-366 - Annie De Montigny-Leboeuf, Mathieu Couture, Frédéric Massicotte:

Traffic Behaviour Characterization Using NetMate. 367-368 - Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam:

On the Inefficient Use of Entropy for Anomaly Detection. 369-370 - Ikpeme Erete:

Browser-Based Intrusion Prevention System. 371-373 - Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq:

Using Formal Grammar and Genetic Operators to Evolve Malware. 374-375 - Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:

Method for Detecting Unknown Malicious Executables. 376-377 - Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo:

Brave New World: Pervasive Insecurity of Embedded Network Devices. 378-380 - Daisuke Inoue, Mio Suzuki, Masashi Eto

, Katsunari Yoshioka
, Koji Nakao:
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. 381-382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














