Recent advances in intrusion detection : 12th international symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings (Englisch)
- Neue Suche nach: RAID
- Weitere Informationen zu RAID:
- http://d-nb.info/gnd/6102619-0
- Neue Suche nach: Kirda, Engin
- Weitere Informationen zu Kirda, Engin:
- http://d-nb.info/gnd/136202209
- Neue Suche nach: Jha, Somesh
- Neue Suche nach: Balzarotti, Davide
- Neue Suche nach: RAID
- Weitere Informationen zu RAID:
- http://d-nb.info/gnd/6102619-0
2009
-
ISBN:
- Konferenzband / Print
-
Titel:Recent advances in intrusion detection : 12th international symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings
-
Beteiligte:
-
Kongress:RAID ; 12 ; 2009 ; Saint-Malo
International Symposium on Recent Advances in Intrusion Detection ; 12 ; 2009 ; Saint-Malo -
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin , Heidelberg [u.a.]
-
Erscheinungsdatum:2009
-
Format / Umfang:XIII, 384 S.
-
Anmerkungen:235 mm x 155 mm
Ill., graph. Darst.
Literaturangaben
Langzeitarchivierung durch Badische Landesbibliothek -
ISBN:
-
Medientyp:Konferenzband
-
Format:Print
-
Sprache:Englisch
-
Reportnr. / Förderkennzeichen:12752768
- Neue Suche nach: 005.8
- Weitere Informationen zu Dewey Decimal Classification
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection SystemsBolzoni, D. / Etalle, S. / Hartel, P.H. et al. | 2009
- 21
-
Protecting a Moving Target: Addressing Web Application Concept DriftMaggi, F. / Robertson, W. / Kruegel, C. / Vigna, G. et al. | 2009
- 41
-
Adaptive Anomaly Detection via Self-calibration and Dynamic UpdatingCretu-Ciocarlie, G.F. / Stavrou, A. / Locasto, M.E. / Stolfo, S.J. et al. | 2009
- 61
-
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection SystemsRehak, M. / Staab, E. / Fusenig, V. / Pechoucek, M. / Grill, M. / Stiborek, J. / Bartos, K. / Engel, T. et al. | 2009
- 81
-
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and LanguageJacob, G. / Debar, H. / Filiol, E. et al. | 2009
- 101
-
Automatic Generation of String Signatures for Malware DetectionGriffin, K. / Schneider, S. / Hu, X. / Chiueh, T.-c. et al. | 2009
- 121
-
PE-Miner: Mining Structural Information to Detect Malicious Executables in RealtimeShafiq, M.Z. / Tabish, S.M. / Mirza, F. / Farooq, M. et al. | 2009
- 142
-
Automatically Adapting a Trained Anomaly Detector to Software PatchesLi, P. / Gao, D. / Reiter, M.K. et al. | 2009
- 161
-
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided ExplorationCaballero, J. / Liang, Z. / Poosankam, P. / Song, D. et al. | 2009
- 182
-
Automated Behavioral FingerprintingFrancois, J. / Abdelnur, H. / State, R. / Festor, O. et al. | 2009
- 202
-
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly DetectionYan, G. / Eidenbenz, S. / Galli, E. et al. | 2009
- 224
-
Keystroke-Based User Identification on Smart PhonesZahid, S. / Shahzad, M. / Khayam, S.A. / Farooq, M. et al. | 2009
- 244
-
VirusMeter: Preventing Your Cellphone from SpiesLiu, L. / Yan, G. / Zhang, X. / Chen, S. et al. | 2009
- 265
-
Regular Expression Matching on Graphics Hardware for Intrusion DetectionVasiliadis, G. / Polychronakis, M. / Antonatos, S. / Markatos, E.P. / Ioannidis, S. et al. | 2009
- 284
-
Multi-byte Regular Expression Matching with SpeculationLuchaup, D. / Smith, R. / Estan, C. / Jha, S. et al. | 2009
- 304
-
Toward Revealing Kernel Malware Behavior in Virtual Execution EnvironmentsXuan, C. / Copeland, J. / Beyah, R. et al. | 2009
- 326
-
Exploiting Temporal Persistence to Detect Covert Botnet ChannelsGiroire, F. / Chandrashekar, J. / Taft, N. / Schooler, E. / Papagiannaki, D. et al. | 2009
- 346
-
An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly DetectionLi, Y. / Guo, L. / Fang, B.-X. / Liu, X.-T. / Lin-Qi et al. | 2009
- 348
-
Automatic Software Instrumentation for the Detection of Non-control-data AttacksDemay, J.-C. / Totel, E. / Tronel, F. et al. | 2009
- 350
-
BLADE: Slashing the Invisible Channel of Drive-by Download MalwareLu, L. / Yegneswaran, V. / Porras, P. / Lee, W. et al. | 2009
- 353
-
CERN Investigation of Network Behaviour and Anomaly DetectionHulboj, M.M. / Jurga, R.E. et al. | 2009
- 355
-
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security PolicyGeorge, L. / Tong, V.V.T. / Me, L. et al. | 2009
- 357
-
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based ApproachShabtai, A. / Kanonov, U. / Elovici, Y. et al. | 2009
- 359
-
Autonomic Intrusion Detection SystemWang, W. / Guyet, T. / Knapskog, S.J. et al. | 2009
- 362
-
ALICE@home: Distributed Framework for Detecting Malicious SitesErete, I. / Yegneswaran, V. / Porras, P. et al. | 2009
- 365
-
Packet Space Analysis of Intrusion Detection SignaturesMassicotte, F. et al. | 2009
- 367
-
Traffic Behaviour Characterization Using NetMateDe Montigny-Leboeuf, A. / Couture, M. / Massicotte, F. et al. | 2009
- 369
-
On the Inefficient Use of Entropy for Anomaly DetectionJaved, M. / Ashfaq, A.B. / Shafiq, M.Z. / Khayam, S.A. et al. | 2009
- 371
-
Browser-Based Intrusion Prevention SystemErete, I. et al. | 2009
- 374
-
Using Formal Grammar and Genetic Operators to Evolve MalwareNoreen, S. / Murtaza, S. / Shafiq, M.Z. / Farooq, M. et al. | 2009
- 376
-
Method for Detecting Unknown Malicious ExecutablesRozenberg, B. / Gudes, E. / Elovici, Y. / Fledel, Y. et al. | 2009
- 378
-
Brave New World: Pervasive Insecurity of Embedded Network DevicesCui, A. / Song, Y. / Prabhu, P.V. / Stolfo, S.J. et al. | 2009
- 381
-
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks (Extended Abstract)Inoue, D. / Suzuki, M. / Eto, M. / Yoshioka, K. / Nakao, K. et al. | 2009