-
3
-
-
33644565261
-
Polymorphic shellcode engine using spectrum analysis
-
Detristan T., Ulenspiegel T., Malcom Y., Underduk M. S., "Polymorphic shellcode engine using spectrum analysis", Phrack Online Magazine, 61, 2003.
-
(2003)
Phrack Online Magazine
, vol.61
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Underduk, M.S.4
-
4
-
-
35048839283
-
Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers
-
Proceedings of the Genetic and Evolutionary Computation Conference
-
Dozier, G., Brown, D., Cain, K., Hurley, J., "Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers," Proceedings of the Genetic and Evolutionary Computation Conference, Lecture Notes in Computer Science, LNCS 3102, pp 263-274, 2004.
-
(2004)
Lecture Notes in Computer Science, LNCS
, vol.3102
, pp. 263-274
-
-
Dozier, G.1
Brown, D.2
Cain, K.3
Hurley, J.4
-
7
-
-
85013813547
-
-
Syngress Publishing, ISBN 1-932266-67-4, Ch.5
-
Foster J.C., Osipov V., Bhalla N., Heinen N., "Buffer Overflow Attacks: Detect, Exploit, Prevent", Syngress Publishing, ISBN 1-932266-67-4, Ch.5, 2005.
-
(2005)
Buffer Overflow Attacks: Detect, Exploit, Prevent
-
-
Foster, J.C.1
Osipov, V.2
Bhalla, N.3
Heinen, N.4
-
8
-
-
0002819121
-
A Comparative Analysis of Selection Schemes Used in Genetic Algorithms
-
G.J.E. Rawlins ed, Morgan Kaufmann, ISBN 1-55860-170-8
-
Goldberg D.E., Deb K., "A Comparative Analysis of Selection Schemes Used in Genetic Algorithms," in Foundations of Genetic Algorithms, G.J.E. Rawlins (ed.), Morgan Kaufmann, ISBN 1-55860-170-8, 1991.
-
(1991)
Foundations of Genetic Algorithms
-
-
Goldberg, D.E.1
Deb, K.2
-
11
-
-
33846276395
-
-
Miller B.L., Shaw M.J., Genetic Algorithms with dynamic Niche Sharing for Multimodal Function optimization, University Of Illinois at Urbana-Champaign, Dept. General Engineering, IlliGAL Report 95010, 1995.
-
Miller B.L., Shaw M.J., "Genetic Algorithms with dynamic Niche Sharing for Multimodal Function optimization", University Of Illinois at Urbana-Champaign, Dept. General Engineering, IlliGAL Report 95010, 1995.
-
-
-
-
12
-
-
0035415174
-
Grammatical Evolution
-
O'Neill, M., Ryan, C.: "Grammatical Evolution", IEEE Transactions on Evolutionary Computation, Vol. 5, No. 4, pp 349-358, 2001.
-
(2001)
IEEE Transactions on Evolutionary Computation
, vol.5
, Issue.4
, pp. 349-358
-
-
O'Neill, M.1
Ryan, C.2
-
13
-
-
14844301986
-
THOR: A tool to test intrusion detection systems by variations of attacks
-
Master's Thesis, Swiss Federal Institute of Technology, March
-
Marti R., "THOR: A tool to test intrusion detection systems by variations of attacks", Master's Thesis, Swiss Federal Institute of Technology, March 2002.
-
(2002)
-
-
Marti, R.1
-
15
-
-
21644443817
-
Automatic Generation and Analysis of NIDS Attacks
-
ACSAC, pp
-
Rubin S., Jha S., Miller B.P., "Automatic Generation and Analysis of NIDS Attacks", 20th Annual Computer Security Applications Conference - ACSAC, pp 28-38, 2004.
-
(2004)
20th Annual Computer Security Applications Conference
, pp. 28-38
-
-
Rubin, S.1
Jha, S.2
Miller, B.P.3
-
16
-
-
33846287063
-
-
last accessed Mar 2005
-
Snort Web Site - www.snort.org. last accessed Mar 2005.
-
Snort Web Site
-
-
-
17
-
-
84958984156
-
Undermining an Anomaly-based Intrusion Detection System using Common Exploits
-
th International Symposium on Recent Advances in Intrusion Detection, RAID
-
th International Symposium on Recent Advances in Intrusion Detection - RAID, Lecture Notes in Computer Science, LNCS 2516, pp 54-73, 2002.
-
(2002)
Lecture Notes in Computer Science, LNCS
, vol.2516
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
18
-
-
14844322335
-
Testing Network Based Intrusion Detection Signatures Using Mutant Exploits
-
Vigna, G., Robertson, W., Balzarotti D., "Testing Network Based Intrusion Detection Signatures Using Mutant Exploits", ACM Conference on Computer Security, 2004.
-
(2004)
ACM Conference on Computer Security
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
-
19
-
-
0038011184
-
Mimicry Attacks on Host-based Intrusion Detection Systems
-
Wagner, D., Soto, P., "Mimicry Attacks on Host-based Intrusion Detection Systems", ACM Conference on Computer Security, pp 255-264, 2002.
-
(2002)
ACM Conference on Computer Security
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
|