default search action
13. RAID 2010: Ottawa, Ontario, Canada
- Somesh Jha, Robin Sommer, Christian Kreibich:
Recent Advances in Intrusion Detection, 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings. Lecture Notes in Computer Science 6307, Springer 2010, ISBN 978-3-642-15511-6
Network Protection
- Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam:
What Is the Impact of P2P Traffic on Anomaly Detection? 1-17 - Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor:
A Centralized Monitoring Infrastructure for Improving DNS Security. 18-37 - Shad Stafford, Jun Li:
Behavior-Based Worm Detectors Compared. 38-57
High Performance
- Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Smith:
Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams. 58-78 - Giorgos Vasiliadis, Sotiris Ioannidis:
GrAVity: A Massively Parallel Antivirus Engine. 79-96
Malware Detection and Defence
- Abhinav Srivastava, Jonathon T. Giffin:
Automatic Discovery of Parasitic Malware. 97-117 - Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo:
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. 118-137 - Yunjing Xu, Michael D. Bailey, Eric Vander Weele, Farnam Jahanian:
CANVuS: Context-Aware Network Vulnerability Scanning. 138-157 - Jiang Wang, Angelos Stavrou, Anup K. Ghosh:
HyperCheck: A Hardware-Assisted Integrity Monitor. 158-177 - Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang:
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. 178-197 - Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo:
Bait Your Hook: A Novel Detection Technique for Keyloggers. 198-217
Evaluation
- Charles V. Wright, Christopher Connelly, Timothy M. Braje, Jesse C. Rabek, Lee M. Rossey, Robert K. Cunningham:
Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security. 218-237 - Peng Li, Limin Liu, Debin Gao, Michael K. Reiter:
On Challenges in Evaluating Malware Clustering. 238-255 - Kevin S. Killourhy, Roy A. Maxion:
Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates. 256-276
Forensics
- Paul Giura, Nasir D. Memon:
NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring. 277-296 - Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro:
Live and Trustworthy Forensic Analysis of Commodity Production Systems. 297-316 - Kevin A. Roundy, Barton P. Miller:
Hybrid Analysis and Control of Malware. 317-338
Anomaly Detection
- Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani:
Anomaly Detection and Mitigation for Disaster Area Networks. 339-359 - Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken:
Community Epidemic Detection Using Time-Correlated Anomalies. 360-381 - Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Shambhu J. Upadhyaya:
A Data-Centric Approach to Insider Attack Detection in Database Systems. 382-401 - Ashish Kamra, Elisa Bertino:
Privilege States Based Access Control for Fine-Grained Intrusion Response. 402-421
Web Security
- Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
Abusing Social Networks for Automated User Profiling. 422-441 - Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier:
An Analysis of Rogue AV Campaigns. 442-463 - Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen:
Fast-Flux Bot Detection in Real Time. 464-483
Posters
- Luyi Xing, Yuqing Zhang, Shenlong Chen:
A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery. 484-485 - Mohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed:
A Distributed Honeynet at KFUPM: A Case Study. 486-487 - Martin Drasar, Jan Vykopal, Radek Krejcí, Pavel Celeda:
Aspect-Based Attack Detection in Large-Scale Networks. 488-489 - Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Teresa Pepe:
Detecting Network Anomalies in Backbone Networks. 490-491 - Kui Xu, Qiang Ma, Danfeng (Daphne) Yao:
Detecting the Onset of Infection for Secure Hosts. 492-493 - Ying Kong, Yuqing Zhang, Qixu Liu:
Eliminating Human Specification in Static Analysis. 494-495 - Hosoi Takurou, Kanta Matsuura:
Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009. 496-497 - Yipeng Wang, Zhibin Zhang, Li Guo:
Inferring Protocol State Machine from Real-World Trace. 498-499 - Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel:
MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. 500-501 - Jianchun Jiang, Weifeng Chen, Liping Ding:
On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach. 502-504 - Robert Koch, Gabi Dreo Rodosek:
Security System for Encrypted Environments (S2E2). 505-507 - Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence. 508-509 - Salman Niksefat, Mohammad Mehdi Ahaniha, Babak Sadeghiyan, Mehdi Shajari:
Toward Specification-Based Intrusion Detection for Web Applications. 510-511 - Ryan Whelan, David R. Kaeli:
Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices. 512-513 - FuYong Zhang, DeYu Qi, JingLin Hu:
Using IRP for Malware Detection. 514-515
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.