default search action
7. RAID 2004: Sophia Antipolis, France
- Erland Jonsson, Alfonso Valdes, Magnus Almgren:
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings. Lecture Notes in Computer Science 3224, Springer 2004, ISBN 3-540-23123-4
Modelling Process Behaviour
- Lap-Chung Lam, Tzi-cker Chiueh:
Automatic Extraction of Accurate Application-Specific Sandboxing Policy. 1-20 - Haizhi Xu, Wenliang Du, Steve J. Chapin:
Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. 21-38
Detecting Worms and Viruses
- David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen:
HoneyStat: Local Worm Detection Using Honeypots. 39-58 - Stuart E. Schechter, Jaeyeon Jung, Arthur W. Berger:
Fast Detection of Scanning Worm Infections. 59-81 - Ruiqi Hu, Aloysius K. Mok:
Detecting Unknown Massive Mailing Viruses Using Proactive Methods. 82-101
Attack and Alert Analysis
- Tadeusz Pietraszek:
Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. 102-124 - Yi-an Huang, Wenke Lee:
Attack Analysis and Detection for Ad Hoc Routing Protocols. 125-145 - Vinod Yegneswaran, Paul Barford, David Plonka:
On the Design and Use of Internet Sinks for Network Abuse Monitoring. 146-165
Practical Experience
- Jouni Viinikka, Hervé Debar:
Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. 166-187 - Brian Hernacki, Jeremy Bennett, Thomas Lofgren:
Symantec Deception Server Experience with a Commercial Deception System. 188-202
Anomaly Detection
- Ke Wang, Salvatore J. Stolfo:
Anomalous Payload-Based Network Intrusion Detection. 203-222 - Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato:
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. 223-237 - Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, Hui Zhang:
Seurat: A Pointillist Approach to Anomaly Detection. 238-257
Formal Analysis for Intrusion Detection
- Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman:
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. 258-277 - Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt:
Formal Reasoning About Intrusion Detection Systems. 278-295 - Ashish Gehani, Gershon Kedem:
RheoStat: Real-Time Risk Management. 296-314
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.