-
1
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
Brumley D, Newsome J, Song D, Wang H, Jha S. Towards automatic generation of vulnerability-based signatures. In: the 2006 IEEE symposium on security and privacy; 2006. pp. 2-16.
-
(2006)
the 2006 IEEE symposium on security and privacy
, pp. 2-16
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
2
-
-
33845391802
-
Vigilante: End-to-end containment of internet worms
-
Costa M, Crowcroft J, Castro M, Rowstron A, Zhou L, Zhang L, Barham P. Vigilante: end-to-end containment of internet worms. In: ACM symposium on operating systems principles; 2005. pp. 133-47.
-
(2005)
ACM symposium on operating systems principles
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
5
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
Kim HA, Karp B. Autograph: toward automated, distributed worm signature detection. In: USENIX security symposium; 2004. pp. 271-86.
-
(2004)
USENIX security symposium
, pp. 271-286
-
-
Kim, H.A.1
Karp, B.2
-
8
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Levenshtein V.I. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady 10 8 (1966) 707-710
-
(1966)
Soviet Physics Doklady
, vol.10
, Issue.8
, pp. 707-710
-
-
Levenshtein, V.I.1
-
11
-
-
33745800070
-
Fast and automated generation of attack signatures: A basis for building self-protecting servers
-
Liang Z, Sekar R. Fast and automated generation of attack signatures: a basis for building self-protecting servers. In: The 12th ACM conference on Computer and communications security; 2005a. pp. 213-22.
-
(2005)
The 12th ACM conference on Computer and communications security
, pp. 213-222
-
-
Liang, Z.1
Sekar, R.2
-
12
-
-
33846294027
-
Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
-
Liang Z, Sekar R. Automatic generation of buffer overflow attack signatures: an approach based on program behavior models. In: The 21st annual computer security applications conference; 2005b. pp. 215-24.
-
(2005)
The 21st annual computer security applications conference
, pp. 215-224
-
-
Liang, Z.1
Sekar, R.2
-
13
-
-
0034301517
-
The 1999 darpa off-line intrusion detection evaluation
-
Lippmann R., Haines J.W., Fried D.J., Korba J., and Das K. The 1999 darpa off-line intrusion detection evaluation. Comput Networks 34 4 (2000) 579-595
-
(2000)
Comput Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
14
-
-
0014757386
-
A general method applicable to the search for similarities in the amino acid sequence of two proteins
-
Needleman S.B., and Wunsch C.D. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology 48 (1970) 443-453
-
(1970)
Journal of Molecular Biology
, vol.48
, pp. 443-453
-
-
Needleman, S.B.1
Wunsch, C.D.2
-
15
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Newsome J, Song D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: The 12th annual network and distributed system security symposium; 2005.
-
(2005)
The 12th annual network and distributed system security symposium
-
-
Newsome, J.1
Song, D.2
-
18
-
-
0036208872
-
Recent progress in multiple sequence alignment: a survey
-
Notredame C. Recent progress in multiple sequence alignment: a survey. Pharmacogenomics 3 (2002) 131-144
-
(2002)
Pharmacogenomics
, vol.3
, pp. 131-144
-
-
Notredame, C.1
-
19
-
-
0034623005
-
T-coffee: a novel method for fast and accurate multiple sequence alignment
-
Notredame C., Higgins D.G., and Heringa J. T-coffee: a novel method for fast and accurate multiple sequence alignment. Journal of Molecular Biology 302 1 (2000) 205-217
-
(2000)
Journal of Molecular Biology
, vol.302
, Issue.1
, pp. 205-217
-
-
Notredame, C.1
Higgins, D.G.2
Heringa, J.3
-
21
-
-
0023375195
-
The neighbor-joining method: a new method for reconstructing phylogenetic trees
-
Saitou N., and Nei M. The neighbor-joining method: a new method for reconstructing phylogenetic trees. Molecular Biology and Evolution 4 4 (1987) 406-425
-
(1987)
Molecular Biology and Evolution
, vol.4
, Issue.4
, pp. 406-425
-
-
Saitou, N.1
Nei, M.2
-
23
-
-
85180409373
-
Dira: Automatic detection, identification and repair of control-hijacking attacks
-
Smirnov A, Chiueh, Tzi-cker. Dira: automatic detection, identification and repair of control-hijacking attacks. In: Proceedings of NDSS; 2005.
-
(2005)
Proceedings of NDSS
-
-
Smirnov, A.1
Chiueh2
cker, T.3
-
26
-
-
71849119546
-
Concept, characteristics and defending mechanism of worms
-
Tang Y., Luo J., Xiao B., and Wei G. Concept, characteristics and defending mechanism of worms. IEICE Transactions on Information and Systems E92-D 5 (2009) 799-809
-
(2009)
IEICE Transactions on Information and Systems
, vol.E92-D
, Issue.5
, pp. 799-809
-
-
Tang, Y.1
Luo, J.2
Xiao, B.3
Wei, G.4
-
27
-
-
71849093127
-
-
Team MD. Metasploit project; 2007.
-
Team MD. Metasploit project; 2007.
-
-
-
-
28
-
-
0027968068
-
Clustal w: improving the sensitivity of progressive multiple sequence alignment through sequence weighting, position-specific gap penalties and weight matrix choice
-
Thompson J.D., Higgins D.G., and Gibson T.J. Clustal w: improving the sensitivity of progressive multiple sequence alignment through sequence weighting, position-specific gap penalties and weight matrix choice. Nucleic Acids Research 22 22 (1994) 4673-4680
-
(1994)
Nucleic Acids Research
, vol.22
, Issue.22
, pp. 4673-4680
-
-
Thompson, J.D.1
Higgins, D.G.2
Gibson, T.J.3
-
32
-
-
34547261222
-
Packet vaccine: Black-box exploit detection and signature generation
-
Wang XF, Li Z, Xu J, Reiter MK, Kil C, Choi JY. Packet vaccine: black-box exploit detection and signature generation. In: The 13th ACM conference on computer and communications security; 2006. pp. 37-46.
-
(2006)
The 13th ACM conference on computer and communications security
, pp. 37-46
-
-
Wang, X.F.1
Li, Z.2
Xu, J.3
Reiter, M.K.4
Kil, C.5
Choi, J.Y.6
-
33
-
-
33745803872
-
Automatic diagnosis and response to memory corruption vulnerabilities
-
Xu J, Ning P, Kil C, Zhai Y, Bookholt C. Automatic diagnosis and response to memory corruption vulnerabilities. In: The 12th ACM conference on computer and communications security; 2005. pp. 223-34.
-
(2005)
The 12th ACM conference on computer and communications security
, pp. 223-234
-
-
Xu, J.1
Ning, P.2
Kil, C.3
Zhai, Y.4
Bookholt, C.5
|