-
7
-
-
0036079912
-
Alert correlation in a cooperative intrusion detection framework
-
F. Cuppens and A. Miege. Alert Correlation in a Cooperative Intrusion Detection Framework. In IEEE Security and Privacy, 2002.
-
(2002)
IEEE Security and Privacy
-
-
Cuppens, F.1
Miege, A.2
-
10
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M. Handley, V. Paxson, and C. Kreibich. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In Proceedings of the USENIX Security Conference, 2001.
-
(2001)
Proceedings of the USENIX Security Conference
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
16
-
-
31844441673
-
Advanced polymorphic worms: Evading IDS by blending in with normal traffic
-
Georgia Tech College of Computing
-
A. Kolesnikov and W. Lee, Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic. Technical report, Georgia Tech College of Computing, 2004
-
(2004)
Technical Report
-
-
Kolesnikov, A.1
Lee, W.2
-
18
-
-
33745469273
-
Towards collaborative security and P2P intrusion detection
-
June
-
M. E. Locasto, J. J. Parekh, A. D. Keromytis, and S. J. Stolfo. Towards Collaborative Security and P2P Intrusion Detection. In Proceedings of the IEEE Information Assurance Workshop (IAW), pages 333-339, June 2005.
-
(2005)
Proceedings of the IEEE Information Assurance Workshop (IAW)
, pp. 333-339
-
-
Locasto, M.E.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
23
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overflows
-
July/August
-
J. Pincus and B. Baker. Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overflows. IEEE Security & Privacy, 2(4):20-27, July/August 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
24
-
-
18844437024
-
Detection of injected, dynamically generated, and obfuscated malicious code
-
J. C. Rabek, R. I. Khazan, S. M. Lewandowski, and R. K. Cunningham. Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code. In Proceedings of the Workshop on Rapid Malcode (WORM), 2003.
-
(2003)
Proceedings of the Workshop on Rapid Malcode (WORM)
-
-
Rabek, J.C.1
Khazan, R.I.2
Lewandowski, S.M.3
Cunningham, R.K.4
-
29
-
-
84906497159
-
Building a reactive immune system for software services
-
April
-
S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a Reactive Immune System for Software Services. In Proceedings of the USENIX Annual Technical Conference, pages 149-161, April 2005.
-
(2005)
Proceedings of the USENIX Annual Technical Conference
, pp. 149-161
-
-
Sidiroglou, S.1
Locasto, M.E.2
Boyd, S.W.3
Keromytis, A.D.4
-
34
-
-
33745637053
-
Network-based buffer overflow detection by exploit code analysis
-
May
-
A. Stig, A. Clark, and G. Mohay. Network-based Buffer Overflow Detection by Exploit Code Analysis. In AusCERT Conference, May 2004.
-
(2004)
AusCERT Conference
-
-
Stig, A.1
Clark, A.2
Mohay, G.3
-
35
-
-
3042683635
-
Worm and attack early warning: Piercing stealthy reconnaissance
-
May/June
-
S. Stolfo. Worm and Attack Early Warning: Piercing Stealthy Reconnaissance. IEEE Privacy and Security, May/June 2004.
-
(2004)
IEEE Privacy and Security
-
-
Stolfo, S.1
-
36
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure Program Execution Via Dynamic Information Flow Tracking. SIGOPS Operating Systems Review, 38(5):85-96, 2004.
-
(2004)
SIGOPS Operating Systems Review
, vol.38
, Issue.5
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
|