default search action
12. RAID 2009: Saint-Malo, France
- Engin Kirda, Somesh Jha, Davide Balzarotti:
Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Lecture Notes in Computer Science 5758, Springer 2009, ISBN 978-3-642-04341-3
Recent Advances in Intrusion Detection Anomaly and Specification-Based Approaches
- Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel:
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. 1-20 - Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna:
Protecting a Moving Target: Addressing Web Application Concept Drift. 21-40 - Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo:
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. 41-60 - Martin Rehák, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin Grill, Jan Stiborek, Karel Bartos, Thomas Engel:
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. 61-80
Malware Detection and Prevention (I)
- Grégoire Jacob, Hervé Debar, Eric Filiol:
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. 81-100 - Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh:
Automatic Generation of String Signatures for Malware Detection. 101-120 - M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq:
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. 121-141
Network and Host Intrusion Detection and Prevention
- Peng Li, Debin Gao, Michael K. Reiter:
Automatically Adapting a Trained Anomaly Detector to Software Patches. 142-160 - Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song:
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. 161-181 - Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor:
Automated Behavioral Fingerprinting. 182-201
Intrusion Detection for Mobile Devices
- Guanhua Yan, Stephan J. Eidenbenz, Emanuele Galli:
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. 202-223 - Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq:
Keystroke-Based User Identification on Smart Phones. 224-243 - Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen:
VirusMeter: Preventing Your Cellphone from Spies. 244-264
High-Performance Intrusion Detection
- Giorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis:
Regular Expression Matching on Graphics Hardware for Intrusion Detection. 265-283 - Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha:
Multi-byte Regular Expression Matching with Speculation. 284-303
Malware Detection and Prevention (II)
- Chaoting Xuan, John A. Copeland, Raheem A. Beyah:
Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. 304-325 - Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki:
Exploiting Temporal Persistence to Detect Covert Botnet Channels. 326-345
Posters
- Yang Li, Li Guo, Binxing Fang, Xiangtao Liu, Lin Qi:
An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. 346-347 - Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel:
Automatic Software Instrumentation for the Detection of Non-control-data Attacks. 348-349 - Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:
BLADE: Slashing the Invisible Channel of Drive-by Download Malware. 350-352 - Milosz Marian Hulboj, Ryszard Erazm Jurga:
CERN Investigation of Network Behaviour and Anomaly Detection. 353-354 - Laurent George, Valérie Viet Triem Tong, Ludovic Mé:
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. 355-356 - Asaf Shabtai, Uri Kanonov, Yuval Elovici:
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. 357-358 - Wei Wang, Thomas Guyet, Svein J. Knapskog:
Autonomic Intrusion Detection System. 359-361 - Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras:
ALICE@home: Distributed Framework for Detecting Malicious Sites. 362-364 - Frédéric Massicotte:
Packet Space Analysis of Intrusion Detection Signatures. 365-366 - Annie De Montigny-Leboeuf, Mathieu Couture, Frédéric Massicotte:
Traffic Behaviour Characterization Using NetMate. 367-368 - Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam:
On the Inefficient Use of Entropy for Anomaly Detection. 369-370 - Ikpeme Erete:
Browser-Based Intrusion Prevention System. 371-373 - Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq:
Using Formal Grammar and Genetic Operators to Evolve Malware. 374-375 - Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:
Method for Detecting Unknown Malicious Executables. 376-377 - Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo:
Brave New World: Pervasive Insecurity of Embedded Network Devices. 378-380 - Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao:
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. 381-382
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.