-
1
-
-
20844436808
-
Collaborative Internet worm containment
-
Cai M., Hwang K., Kwok Y., Song S., and Chen Y. Collaborative Internet worm containment. IEEE Security and Privacy Magazine 3 3 (2005) 25-33
-
(2005)
IEEE Security and Privacy Magazine
, vol.3
, Issue.3
, pp. 25-33
-
-
Cai, M.1
Hwang, K.2
Kwok, Y.3
Song, S.4
Chen, Y.5
-
2
-
-
58349113165
-
-
Chen, X., & Heidemann, J. (2004). Detecting early worm propagation through packet matching. Technical report ISI-TR-2004-585, USC/Information Sciences Institute.
-
Chen, X., & Heidemann, J. (2004). Detecting early worm propagation through packet matching. Technical report ISI-TR-2004-585, USC/Information Sciences Institute.
-
-
-
-
3
-
-
33846449866
-
Extracting drug utilization knowledge using self-organizing map and rough set theory
-
Chou H.C., Cheng C.H., and Chang J.R. Extracting drug utilization knowledge using self-organizing map and rough set theory. Expert Systems with Applications 33 2 (2007) 499-508
-
(2007)
Expert Systems with Applications
, vol.33
, Issue.2
, pp. 499-508
-
-
Chou, H.C.1
Cheng, C.H.2
Chang, J.R.3
-
4
-
-
33745788387
-
-
Crandall, J. R., Su, Z., & Wu, S. F. (2005). On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In Proceedings of ACM CCS.
-
Crandall, J. R., Su, Z., & Wu, S. F. (2005). On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In Proceedings of ACM CCS.
-
-
-
-
5
-
-
33646742035
-
PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
-
Kim Y., Lau W.C., Chuah M.C., and Chao H.J. PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Transactions on Dependable and Secure Computing 3 2 (2006) 141-155
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
6
-
-
58349096247
-
-
Kruegel, C., & Kirda, E. (2005). Polymorphic worm detection using structural information of executables. In Proceedings of recent advances in intrusion detection (RAID).
-
Kruegel, C., & Kirda, E. (2005). Polymorphic worm detection using structural information of executables. In Proceedings of recent advances in intrusion detection (RAID).
-
-
-
-
8
-
-
33751064824
-
-
Li, Z., Sanghi, M., Chen, Y., Kao, M. Y., & Chavez, B. (2006). Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack. In Proceedings of the 2006 IEEE symposium on security and privacy (pp. 32-47).
-
Li, Z., Sanghi, M., Chen, Y., Kao, M. Y., & Chavez, B. (2006). Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack. In Proceedings of the 2006 IEEE symposium on security and privacy (pp. 32-47).
-
-
-
-
9
-
-
33745800070
-
-
Liang, Z., & Sekar, R. (2005). Fast and automated generation of attack signatures: A basis for building self-protecting servers. In Proceedings of ACM CCS.
-
Liang, Z., & Sekar, R. (2005). Fast and automated generation of attack signatures: A basis for building self-protecting servers. In Proceedings of ACM CCS.
-
-
-
-
10
-
-
0036321445
-
Use of K-nearest neighbor classifier for intrusion detection
-
Liao Y., and Vemuri R. Use of K-nearest neighbor classifier for intrusion detection. Computers and Security 21 5 (2001) 439-448
-
(2001)
Computers and Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, R.2
-
11
-
-
35248857893
-
-
Mahoney, M., & Chan, P. K. (2003). An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In RAID (pp. 220-237).
-
Mahoney, M., & Chan, P. K. (2003). An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In RAID (pp. 220-237).
-
-
-
-
12
-
-
0030736223
-
Computer virus-antivirus coevolution
-
Nachenberg C. Computer virus-antivirus coevolution. Communications of the ACM 40 1 (1997) 46-51
-
(1997)
Communications of the ACM
, vol.40
, Issue.1
, pp. 46-51
-
-
Nachenberg, C.1
-
13
-
-
58349090419
-
-
Newsome, J., Karp, B., & Song, D. (2005). Polygraph: Automatically generating signatures for polymorphic worms. In Proceedings of the security and privacy symposium.
-
Newsome, J., Karp, B., & Song, D. (2005). Polygraph: Automatically generating signatures for polymorphic worms. In Proceedings of the security and privacy symposium.
-
-
-
-
14
-
-
58349102488
-
-
Newsome, J., & Song, D. (2005). Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of NDSS.
-
Newsome, J., & Song, D. (2005). Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of NDSS.
-
-
-
-
15
-
-
84942234675
-
-
Nojiri, D., Rowe, J., & Levitt, K. (2003). Cooperative response strategies for large scale attack mitigation. In Proceedings of the 3rd DARPA information survivability conference and exposition (DISCEX) (pp. 293-302).
-
Nojiri, D., Rowe, J., & Levitt, K. (2003). Cooperative response strategies for large scale attack mitigation. In Proceedings of the 3rd DARPA information survivability conference and exposition (DISCEX) (pp. 293-302).
-
-
-
-
16
-
-
33745133346
-
A monitoring system for detecting repeated packets with applications to computer worms
-
Oorschot P.C., Robert J.M., and Martin M.V. A monitoring system for detecting repeated packets with applications to computer worms. Internet Journal of Information Security 5 3 (2006) 186-199
-
(2006)
Internet Journal of Information Security
, vol.5
, Issue.3
, pp. 186-199
-
-
Oorschot, P.C.1
Robert, J.M.2
Martin, M.V.3
-
17
-
-
0034776786
-
-
Park, K. & Lee, H. (2001). On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internet. In Proceedings of ACM SIGCOMM'01 (pp. 15-26).
-
Park, K. & Lee, H. (2001). On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internet. In Proceedings of ACM SIGCOMM'01 (pp. 15-26).
-
-
-
-
18
-
-
0030393936
-
-
Pawlak, Z. (1996). Why rough sets? In Proceedings of the 5th IEEE international conference on fuzzy systems, Piscataway, New Jersey, USA (Vol. 2, pp. 738-743).
-
Pawlak, Z. (1996). Why rough sets? In Proceedings of the 5th IEEE international conference on fuzzy systems, Piscataway, New Jersey, USA (Vol. 2, pp. 738-743).
-
-
-
-
19
-
-
58349095971
-
-
Roesch, M. (2001). Snort: The lightweight network intrusion detection system. Accessed November 2007.
-
Roesch, M. (2001). Snort: The lightweight network intrusion detection system. Accessed November 2007.
-
-
-
-
20
-
-
58349106626
-
-
Russell, R. (1999). Linux iptables HOWTO. http://www.linuxguruz.com/iptables/howto. [Accessed November, 2007].
-
Russell, R. (1999). Linux iptables HOWTO. http://www.linuxguruz.com/iptables/howto. [Accessed November, 2007].
-
-
-
-
21
-
-
58349092289
-
-
Shannon, C. & Moore, D. (2004). The spread of the Witty worm. Accessed November 2007.
-
Shannon, C. & Moore, D. (2004). The spread of the Witty worm. Accessed November 2007.
-
-
-
-
22
-
-
33748195464
-
Rough set theory in analyzing the attributes of combination values for the insurance market
-
Shyng J.Y., Wang F.K., Tzeng G.H., and Wu K.S. Rough set theory in analyzing the attributes of combination values for the insurance market. Expert Systems with Applications 32 1 (2007) 56-64
-
(2007)
Expert Systems with Applications
, vol.32
, Issue.1
, pp. 56-64
-
-
Shyng, J.Y.1
Wang, F.K.2
Tzeng, G.H.3
Wu, K.S.4
-
23
-
-
58349091033
-
-
Singh, S., Estan, C., Varghese, G., & Savage, S. (2003). The earlybird system for real-time detection of unknown worms. Technical report CS-2003-0761, University of California, San Diego.
-
Singh, S., Estan, C., Varghese, G., & Savage, S. (2003). The earlybird system for real-time detection of unknown worms. Technical report CS-2003-0761, University of California, San Diego.
-
-
-
-
24
-
-
85084162258
-
-
Staniford, S., Paxson, V., & Weaver, N. (2002). How to own the Internet in your spare time. In Proceedings of the 11th USENIX security symposium.
-
Staniford, S., Paxson, V., & Weaver, N. (2002). How to own the Internet in your spare time. In Proceedings of the 11th USENIX security symposium.
-
-
-
-
25
-
-
58349090826
-
-
Symantec Corp. (2002). FreeBSD scalper worm. Accessed November 2007.
-
Symantec Corp. (2002). FreeBSD scalper worm. Accessed November 2007.
-
-
-
-
26
-
-
16244416222
-
On acquiring classification knowledge from noisy data based on rough set
-
Wang F.H. On acquiring classification knowledge from noisy data based on rough set. Expert Systems with Applications 29 (2005) 49-64
-
(2005)
Expert Systems with Applications
, vol.29
, pp. 49-64
-
-
Wang, F.H.1
-
27
-
-
58349119119
-
-
Wang, H., Guo, C., & Simon, D., & Zugenmaier, A. (2004). Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In Proceedings of ACM SIGCOMM'04, Portland, OR.
-
Wang, H., Guo, C., & Simon, D., & Zugenmaier, A. (2004). Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In Proceedings of ACM SIGCOMM'04, Portland, OR.
-
-
-
-
28
-
-
58349110713
-
-
Wang, W., Luo, D. S., & Zhang, J. (2006). Detect polymorphic worms based on semantic signature and data mining. In Proceedings of the first communications and networking conference, China.
-
Wang, W., Luo, D. S., & Zhang, J. (2006). Detect polymorphic worms based on semantic signature and data mining. In Proceedings of the first communications and networking conference, China.
-
-
-
-
29
-
-
33745154148
-
-
Xin, Y., Fang, B. X., Yun, X. C., & Chen, H. Y. (2005). Worm detection in large scale network by traffic. In Sixth international conference on parallel and distributed computing applications and technologies, China (pp. 270-273).
-
Xin, Y., Fang, B. X., Yun, X. C., & Chen, H. Y. (2005). Worm detection in large scale network by traffic. In Sixth international conference on parallel and distributed computing applications and technologies, China (pp. 270-273).
-
-
-
-
30
-
-
33748133783
-
Applying rough sets to prevent customer complaints for IC packaging foundry
-
Yang H.H., Liu T.C., and Lin Y.T. Applying rough sets to prevent customer complaints for IC packaging foundry. Expert Systems with Applications 32 1 (2007) 151-156
-
(2007)
Expert Systems with Applications
, vol.32
, Issue.1
, pp. 151-156
-
-
Yang, H.H.1
Liu, T.C.2
Lin, Y.T.3
-
32
-
-
58349112509
-
-
Zou, C. C., Gao, L., Gong, W., & Towsley, D. (2003). Monitoring and early warning for internet worms. Technical report TR-CSE-03-01, Department of Computer Science, University of Massachusetts, Amherst.
-
Zou, C. C., Gao, L., Gong, W., & Towsley, D. (2003). Monitoring and early warning for internet worms. Technical report TR-CSE-03-01, Department of Computer Science, University of Massachusetts, Amherst.
-
-
-
|