-
2
-
-
84890863223
-
A Cooperative Immunization System for an Untrusting Internet
-
K. G. Anagnostakis, M. B. Greenwald, S. Ioannidis, A. D. Keromytis, and D. Li. A Cooperative Immunization System for an Untrusting Internet. In IEEE International Conference on Networks, 2003.
-
(2003)
IEEE International Conference on Networks
-
-
Anagnostakis, K.G.1
Greenwald, M.B.2
Ioannidis, S.3
Keromytis, A.D.4
Li, D.5
-
3
-
-
85012127915
-
Privacy-Preserving Indexing of Documents on the Network
-
M. Bawa, R. J. Bayardo Jr., and R. Agrawal. Privacy-Preserving Indexing of Documents on the Network. In VLDB, 2003.
-
(2003)
VLDB
-
-
Bawa, M.1
Bayardo Jr., R.J.2
Agrawal, R.3
-
5
-
-
0014814325
-
Space/time trade-offs in Hash Coding with Allowable Errors
-
B. H. Bloom. Space/time trade-offs in Hash Coding with Allowable Errors. Communications of the ACM, 13(7):422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
6
-
-
8344271981
-
Approximate Caches for Packet Classification
-
F. Chang, W.-c. Feng, and K. Li. Approximate Caches for Packet Classification. In IEEE INFOCOM, 2004.
-
(2004)
IEEE INFOCOM
-
-
Chang, F.1
Feng, W.-C.2
Li, K.3
-
7
-
-
84888402098
-
The Zombie Roundup: Understanding, Detecting and Disrupting Botnets
-
Cambridge, MA
-
E. Cooke, F. Jahanian, and D. McPherson. The Zombie Roundup: Understanding, Detecting and Disrupting Botnets. In USENIX SRUTI Workshop, Cambridge, MA, 2005.
-
(2005)
USENIX SRUTI Workshop
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
8
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-End Containment of Internet Worms. In ACM SOSP, 2005.
-
(2005)
ACM SOSP
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
9
-
-
33749060634
-
Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks
-
Las Vegas, NV
-
G. Cretu, J. J. Parekh, K. Wang, and S. J. Stolfo. Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks. In IEEE Consumer Communications and Networking Conference, Las Vegas, NV, 2006.
-
(2006)
IEEE Consumer Communications and Networking Conference
-
-
Cretu, G.1
Parekh, J.J.2
Wang, K.3
Stolfo, S.J.4
-
13
-
-
0242496951
-
Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems
-
W. Du and M. Atallah. Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems. In New Security Paradigms Workshop, 2001.
-
(2001)
New Security Paradigms Workshop
-
-
Du, W.1
Atallah, M.2
-
14
-
-
33845584959
-
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
-
L. Fan, P. Cao, J. Almeida, and A. Broder. Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. In ACM SIGCOMM, 1998.
-
(1998)
ACM SIGCOMM
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.4
-
15
-
-
34248368391
-
BARTER: Profile Model Exchange for Behavior-based Access Control
-
Technical report, Columbia University, 2006. Submitted to conference
-
V. Frias-Martinez and S. J. Stolfo. BARTER: Profile Model Exchange for Behavior-based Access Control. Technical report, Columbia University, 2006. Submitted to conference.
-
-
-
Frias-Martinez, V.1
Stolfo, S.J.2
-
16
-
-
85180415640
-
Privacy-Preserving Friends Troubleshooting Network
-
San Diego, CA
-
Q. Huang, H. J. Wang, and N. Borisov. Privacy-Preserving Friends Troubleshooting Network. In NDSS, San Diego, CA, 2005.
-
(2005)
NDSS
-
-
Huang, Q.1
Wang, H.J.2
Borisov, N.3
-
17
-
-
84942121141
-
Indra: A peer-to-peer approach to network intrusion detection and prevention
-
R. Janakiraman, M. Waldvogel, and Q. Zhang. Indra: A peer-to-peer approach to network intrusion detection and prevention. In WETICE, 2003.
-
(2003)
WETICE
-
-
Janakiraman, R.1
Waldvogel, M.2
Zhang, Q.3
-
18
-
-
85084163246
-
Autograph: Toward Automated, Distributed Worm Signature Detection
-
San Diego, CA
-
H.-A. Kim and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In USENIX Security Symposium, San Diego, CA, 2004.
-
(2004)
USENIX Security Symposium
-
-
Kim, H.-A.1
Karp, B.2
-
19
-
-
38049094878
-
Privacy-Preserving Set Operations
-
L. Kissner and D. Song. Privacy-Preserving Set Operations. In CRYPTO, 2005.
-
(2005)
CRYPTO
-
-
Kissner, L.1
Song, D.2
-
21
-
-
33646048960
-
Honeycomb - Creating Intrusion Detection Signatures Using Honeypots
-
Boston, MA
-
C. Kreibich and J. Crowcroft. Honeycomb - Creating Intrusion Detection Signatures Using Honeypots. In ACM Workshop on Hot Topics in Networks, Boston, MA, 2003.
-
(2003)
ACM Workshop on Hot Topics in Networks
-
-
Kreibich, C.1
Crowcroft, J.2
-
22
-
-
33746389292
-
Polymorphic Worm Detection Using Structural Information of Executables
-
Seattle, WA
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic Worm Detection Using Structural Information of Executables. In Symposium on Recent Advances in Intrusion Detection, Seattle, WA, 2005.
-
(2005)
Symposium on Recent Advances in Intrusion Detection
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
24
-
-
33745800070
-
Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecing Servers
-
Alexandria, VA
-
Z. Liang and R. Sekar. Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecing Servers. In ACM Conference on Computer and Communications Security, Alexandria, VA, 2005.
-
(2005)
ACM Conference on Computer and Communications Security
-
-
Liang, Z.1
Sekar, R.2
-
25
-
-
85084159849
-
Privacy-Preserving Sharing and Correlation of Security Alerts
-
P. Lincoln, P. Porras, and V. Shmatikov. Privacy-Preserving Sharing and Correlation of Security Alerts. In USENIX Security, 2004.
-
(2004)
USENIX Security
-
-
Lincoln, P.1
Porras, P.2
Shmatikov, V.3
-
26
-
-
33745469273
-
Towards Collaborative Security and P2P Intrusion Detection
-
West Point, NY
-
M. E. Locasto, J. J. Parekh, A. D. Keromytis, and S. J. Stolfo. Towards Collaborative Security and P2P Intrusion Detection. In IEEE Information Assurance Workshop, West Point, NY, 2005.
-
(2005)
IEEE Information Assurance Workshop
-
-
Locasto, M.E.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
27
-
-
85180635118
-
Software Self-Healing Using Collaborative Application Communities
-
San Diego, CA
-
M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. Software Self-Healing Using Collaborative Application Communities. In Internet Society (ISOC) Symposium on Network and Distributed Systems Security, pages 95-106, San Diego, CA, 2006.
-
(2006)
Internet Society (ISOC) Symposium on Network and Distributed Systems Security
, pp. 95-106
-
-
Locasto, M.E.1
Sidiroglou, S.2
Keromytis, A.D.3
-
28
-
-
33750951962
-
FLIPS: Hybrid Adaptive Intrusion Prevention
-
Seattle, WA
-
M. E. Locasto, K. Wang, A. D. Keromytis, and S. J. Stolfo. FLIPS: Hybrid Adaptive Intrusion Prevention. In Symposium on Recent Advances in Intrusion Detection, Seattle, WA, 2005.
-
(2005)
Symposium on Recent Advances in Intrusion Detection
-
-
Locasto, M.E.1
Wang, K.2
Keromytis, A.D.3
Stolfo, S.J.4
-
30
-
-
27544498978
-
Polygraph: Automatically Generating Signatures for Polymorphic Worms
-
Oakland, CA
-
J. Newsome, B. Karp, and D. Song. Polygraph: Automatically Generating Signatures for Polymorphic Worms. In IEEE Security and Privacy, Oakland, CA, 2005.
-
(2005)
IEEE Security and Privacy
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
31
-
-
34248355022
-
Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection
-
Technical report
-
J. J. Parekh, K. Wang, and S. J. Stolfo. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection. Technical report, 2006. http://mice.cs.columbia.edu/getTechreport.php?techreportID=409.
-
(2006)
-
-
Parekh, J.J.1
Wang, K.2
Stolfo, S.J.3
-
33
-
-
34248387582
-
-
H. Project and R. Alliance. Know your Enemy: Tracking Botnets, 3/13/05 2005. http://www.honeynet.org/papers/bots/. [34] S. Singh, C. Estan, G. Varghese, and S. Savage. Automated Worm Fingerprinting. In 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, CA, 2004.
-
H. Project and R. Alliance. Know your Enemy: Tracking Botnets, 3/13/05 2005. http://www.honeynet.org/papers/bots/. [34] S. Singh, C. Estan, G. Varghese, and S. Savage. Automated Worm Fingerprinting. In 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, CA, 2004.
-
-
-
-
34
-
-
0000949239
-
GrIDS -A Graph Based Intrusion Detection System for Large Networks
-
Baltimore, MD
-
S. Staniford-Chen, S. Cheung, R. Crawford, and M. Dilger. GrIDS -A Graph Based Intrusion Detection System for Large Networks. In National Information Computer Security Conference, Baltimore, MD, 1996.
-
(1996)
National Information Computer Security Conference
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
-
36
-
-
3042683635
-
Worm and Attack Early Warning: Piercing Stealthy Reconnaissance
-
S. J. Stolfo. Worm and Attack Early Warning: Piercing Stealthy Reconnaissance. IEEE Security and Privacy, 2004.
-
(2004)
IEEE Security and Privacy
-
-
Stolfo, S.J.1
-
37
-
-
85172423269
-
JAM: Java Agents for Meta-Learning over Distributed Databases
-
Newport Beach, CA
-
S. J. Stolfo, A. L. Prodromidis, S. Tselepis, W Lee, D. W. Fan, and P. Chan. JAM: Java Agents for Meta-Learning over Distributed Databases. In International Conference on Knowledge Discovery and Data Mining, Newport Beach, CA, 1997.
-
(1997)
International Conference on Knowledge Discovery and Data Mining
-
-
Stolfo, S.J.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.W.5
Chan, P.6
-
38
-
-
25844462447
-
Defending Against Internet Worms: A Signature-Based Approach
-
Miami, FL
-
Y. Tang and S. Chen. Defending Against Internet Worms: A Signature-Based Approach. In IEEE Infocom, Miami, FL, 2005.
-
(2005)
IEEE Infocom
-
-
Tang, Y.1
Chen, S.2
-
40
-
-
0038011184
-
Mimicry Attacks on Host-Based Intrusion Detection Systems
-
D. Wagner and P. Soto. Mimicry Attacks on Host-Based Intrusion Detection Systems. In ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Wagner, D.1
Soto, P.2
-
41
-
-
33750352075
-
Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
-
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In ACM SIGCOMM, 2004.
-
(2004)
ACM SIGCOMM
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
42
-
-
85077048913
-
Automatic Misconfiguration Troubleshooting with PeerPressure
-
San Francisco
-
H. J. Wang, J. C. Platt, Y. Chen, R. Zhang, and Y.-M. Wang. Automatic Misconfiguration Troubleshooting with PeerPressure. In OSDI, San Francisco, 2004.
-
(2004)
OSDI
-
-
Wang, H.J.1
Platt, J.C.2
Chen, Y.3
Zhang, R.4
Wang, Y.-M.5
-
48
-
-
85137546697
-
Global Intrusion Detection in the DOMINO Overlay System
-
V. Yegneswaran, P. Barford, and S. Jha. Global Intrusion Detection in the DOMINO Overlay System. In NDSS, 2004.
-
(2004)
NDSS
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
|