Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/raid/raid2012.bht:"
@inproceedings{DBLP:conf/raid/AhnL12, author = {Dongkyun Ahn and Gyungho Lee}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {A Memory Access Validation Scheme against Payload Injection Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {107--126}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_6}, doi = {10.1007/978-3-642-33338-5\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/AhnL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AmannSSH12, author = {B. Amann and Robin Sommer and Aashish Sharma and Seth Hall}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {314--333}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_16}, doi = {10.1007/978-3-642-33338-5\_16}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AmannSSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CarboneCML12, author = {Martim Carbone and Matthew Conover and Bruce Montague and Wenke Lee}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {22--41}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_2}, doi = {10.1007/978-3-642-33338-5\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CarboneCML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChuGHJYY12, author = {Jie Chu and Zihui Ge and Richard Huber and Ping Ji and Jennifer Yates and Yung{-}Chao Yu}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {{ALERT-ID:} Analyze Logs of the Network Element in Real Time for Intrusion Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {294--313}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_15}, doi = {10.1007/978-3-642-33338-5\_15}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChuGHJYY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CuiSLL12, author = {Xiang Cui and Jinqiao Shi and Peng Liao and Chaoge Liu}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {376--377}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_20}, doi = {10.1007/978-3-642-33338-5\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/CuiSLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DurfinaKZK12, author = {Luk{\'{a}}s Durfina and Jakub Kroustek and Petr Zemek and Bretislav K{\'{a}}bele}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {390--392}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_27}, doi = {10.1007/978-3-642-33338-5\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/DurfinaKZK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Garcia-VillalbaCOP12, author = {Luis Javier Garc{\'{\i}}a{-}Villalba and Jaime Daniel Mej{\'{\i}}a Castro and Ana Lucila Sandoval Orozco and Javier Mart{\'{\i}}nez Puentes}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {397--398}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_30}, doi = {10.1007/978-3-642-33338-5\_30}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/Garcia-VillalbaCOP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HadziosmanovicSBZE12, author = {Dina Hadziosmanovic and Lorenzo Simionato and Damiano Bolzoni and Emmanuele Zambon and Sandro Etalle}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {354--373}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_18}, doi = {10.1007/978-3-642-33338-5\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HadziosmanovicSBZE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JinYC12, author = {Shuyuan Jin and Zhi Yang and Xiang Cui}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Automatic Covert Channel Detection in Asbestos System (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {380--381}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_22}, doi = {10.1007/978-3-642-33338-5\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JinYC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LauingerKM12, author = {Tobias Lauinger and Engin Kirda and Pietro Michiardi}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {169--189}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_9}, doi = {10.1007/978-3-642-33338-5\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LauingerKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LekiesNTPJ12, author = {Sebastian Lekies and Nick Nikiforakis and Walter Tighzert and Frank Piessens and Martin Johns}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {{DEMACRO:} Defense against Malicious Cross-Domain Requests}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {254--273}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_13}, doi = {10.1007/978-3-642-33338-5\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LekiesNTPJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MahmoodD12, author = {Shah Mahmood and Yvo Desmedt}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {374--375}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_19}, doi = {10.1007/978-3-642-33338-5\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MahmoodD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MankinK12, author = {Jennifer Mankin and David R. Kaeli}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Dione: {A} Flexible Disk Monitoring and Analysis Framework}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {127--146}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_7}, doi = {10.1007/978-3-642-33338-5\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MankinK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MarchalFSE12, author = {Samuel Marchal and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Radu State and Thomas Engel}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Proactive Discovery of Phishing Related Domain Names}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {190--209}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_10}, doi = {10.1007/978-3-642-33338-5\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MarchalFSE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MashimaC12, author = {Daisuke Mashima and Alvaro A. C{\'{a}}rdenas}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Evaluating Electricity Theft Detectors in Smart Grid Networks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {210--229}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_11}, doi = {10.1007/978-3-642-33338-5\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MashimaC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OverveldtKV12, author = {Timon Van Overveldt and Christopher Kruegel and Giovanni Vigna}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {FlashDetect: ActionScript 3 Malware Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {274--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_14}, doi = {10.1007/978-3-642-33338-5\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/OverveldtKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/QiaoLSG12, author = {Dengke Qiao and Tingwen Liu and Yong Sun and Li Guo}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {{EFA} for Efficient Regular Expression Matching in {NIDS} (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {382--383}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_23}, doi = {10.1007/978-3-642-33338-5\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/QiaoLSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SanchezG12, author = {Jenny Andrea Pinto S{\'{a}}nchez and Luis Javier Garc{\'{\i}}a{-}Villalba}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {386--387}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_25}, doi = {10.1007/978-3-642-33338-5\_25}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SanchezG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShoshaJLG12, author = {Ahmed F. Shosha and Joshua James and Chen{-}Ching Liu and Pavel Gladyshev}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {388--389}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_26}, doi = {10.1007/978-3-642-33338-5\_26}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShoshaJLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SrivastavaRGE12, author = {Abhinav Srivastava and Himanshu Raj and Jonathon T. Giffin and Paul England}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Trusted {VM} Snapshots in Untrusted Cloud Infrastructures}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {1--21}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_1}, doi = {10.1007/978-3-642-33338-5\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SrivastavaRGE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ThonnardBOKL12, author = {Olivier Thonnard and Leyla Bilge and Gavin O'Gorman and Se{\'{a}}n Kiernan and Martin Lee}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {64--85}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_4}, doi = {10.1007/978-3-642-33338-5\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ThonnardBOKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ValgentiCSSKKD12, author = {Victor C. Valgenti and Jatin Chhugani and Yan Sun and Nadathur Satish and Min Sik Kim and Changkyu Kim and Pradeep Dubey}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {334--353}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_17}, doi = {10.1007/978-3-642-33338-5\_17}, timestamp = {Wed, 30 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ValgentiCSSKKD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VeendCB12, author = {Victor van der Veen and Nitish dutt{-}Sharma and Lorenzo Cavallaro and Herbert Bos}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Memory Errors: The Past, the Present, and the Future}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {86--106}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_5}, doi = {10.1007/978-3-642-33338-5\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VeendCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VegaVCG12, author = {Hugo Villan{\'{u}}a Vega and Jorge Maestre Vidal and Jaime Daniel Mej{\'{\i}}a Castro and Luis Javier Garc{\'{\i}}a{-}Villalba}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Improvement of an Anagram Based {NIDS} by Reducing the Storage Space of Bloom Filters (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {393--394}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_28}, doi = {10.1007/978-3-642-33338-5\_28}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VegaVCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VellaTR12, author = {Mark Vella and Sotirios Terzis and Marc Roper}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Distress Detection (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {384--385}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_24}, doi = {10.1007/978-3-642-33338-5\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VellaTR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VidalVCG12, author = {Jorge Maestre Vidal and Hugo Villan{\'{u}}a Vega and Jaime Daniel Mej{\'{\i}}a Castro and Luis Javier Garc{\'{\i}}a{-}Villalba}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Concurrency Optimization for {NIDS} (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {395--396}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_29}, doi = {10.1007/978-3-642-33338-5\_29}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VidalVCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WuYF12, author = {Jinyu Wu and Lihua Yin and Binxing Fang}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract)}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {378--379}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_21}, doi = {10.1007/978-3-642-33338-5\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WuYF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuHCZH12, author = {Zhi Xu and Hung{-}Yuan Hsu and Xin Chen and Sencun Zhu and Ali R. Hurson}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {{AK-PPM:} An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {147--168}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_8}, doi = {10.1007/978-3-642-33338-5\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuHCZH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangL12, author = {Shengzhi Zhang and Peng Liu}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Assessing the Trustworthiness of Drivers}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {42--63}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_3}, doi = {10.1007/978-3-642-33338-5\_3}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangYXG12, author = {Jialong Zhang and Chao Yang and Zhaoyan Xu and Guofei Gu}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {PoisonAmplifier: {A} Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {230--253}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_12}, doi = {10.1007/978-3-642-33338-5\_12}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangYXG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2012, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5}, doi = {10.1007/978-3-642-33338-5}, isbn = {978-3-642-33337-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.