-
1
-
-
77955043847
-
Carmentis: A co-operative approach towards situation awareness and early warning for the internet
-
GI
-
Grobauer, B., Mehlau, J., Sander, J.: Carmentis: A co-operative approach towards situation awareness and early warning for the internet. In: Proc. of IMF 2006. LNI, vol.97, pp. 55-66. GI (2006)
-
(2006)
Proc. of IMF 2006 LNI
, vol.97
, pp. 55-66
-
-
Grobauer, B.1
Mehlau, J.2
Sander, J.3
-
2
-
-
77955036924
-
-
DShield: DShield website (2008), http://www.dshield.org
-
(2008)
DShield Website
-
-
-
4
-
-
77955021351
-
-
(in German) Sichere Wege in der vernetzten Welt - Tagungsband zum 11. Deutscher IT-Sicherheitskongress (in German), SecuMedia Verlag
-
Engelberth, M., Freiling, F., Göbel, J., Gorecki, C., Holz, T., Trinius, P., Willems, C.: Frühe Warnung durch Beobachten und Verfolgen von bösartiger Software im Deutschen Internet: Das Internet-Malware-Analyse- System (IAS) (in German). In: Sichere Wege in der vernetzten Welt - Tagungsband zum 11. Deutscher IT-Sicherheitskongress (in German), pp. 353-367. SecuMedia Verlag (2009)
-
(2009)
Frühe Warnung Durch Beobachten und Verfolgen von Bösartiger Software im Deutschen Internet: Das Internet-Malware-Analyse-System (IAS)
, pp. 353-367
-
-
Engelberth, M.1
Freiling, F.2
Göbel, J.3
Gorecki, C.4
Holz, T.5
Trinius, P.6
Willems, C.7
-
5
-
-
77953719231
-
Intelligent network-based early warning systems
-
CRITIS 2006, López, J. (ed.), Springer, Heidelberg
-
Bsufka, K., Kroll-Peters, O., Albayrak, S.: Intelligent network-based early warning systems. In: López, J. (ed.) CRITIS 2006. LNCS, vol.4347, pp. 103-111. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4347
, pp. 103-111
-
-
Bsufka, K.1
Kroll-Peters, O.2
Albayrak, S.3
-
7
-
-
77955031062
-
08102 working group - Early warning systems
-
Dagstuhl Seminar Proceedings, 08102
-
Biskup, J., Hämmerli, B.M., Meier, M., Schmerl, S., Tölle, J., Vogel, M.: 08102 working group - early warning systems. In: Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, vol.08102 (2008)
-
(2008)
Perspectives Workshop: Network Attack Detection and Defense
-
-
Biskup, J.1
Hämmerli, B.M.2
Meier, M.3
Schmerl, S.4
Tölle, J.5
Vogel, M.6
-
8
-
-
33750376598
-
The Nepenthes platform: An efficient approach to collect malware
-
RAID 2006, Zamboni, D., Krügel, C. (eds.), Springer, Heidelberg
-
Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.: The Nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol.4219, pp. 165-184. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4219
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
9
-
-
70349098508
-
-
Amun: Python Honeypot, http://amunhoney.sourceforge.net/
-
Python Honeypot
-
-
-
11
-
-
78649241967
-
Graph-based comparison of executable objects
-
Dullien, T., Rolles, R.: Graph-based comparison of executable objects. In: Proc. of SSTIC 2005 (2005)
-
(2005)
Proc. of SSTIC 2005
-
-
Dullien, T.1
Rolles, R.2
-
12
-
-
49949090311
-
Learning and classification of malware behavior
-
DIMVA 2008, Zamboni, D. (ed.), Springer, Heidelberg
-
Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol.5137, pp. 108-125. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
13
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using CWSandbox. IEEE Security & Privacy 5(2), 32-39 (2007)
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
14
-
-
0003126321
-
A general theory of classificatory sorting strategies: II. Clustering systems
-
Lance, G.N., Williams, W.T.: A general theory of classificatory sorting strategies: II. Clustering systems. The Computer Journal 10(3), 271-277 (1967)
-
(1967)
The Computer Journal
, vol.10
, Issue.3
, pp. 271-277
-
-
Lance, G.N.1
Williams, W.T.2
-
15
-
-
0029723348
-
A robust clustering algorithm based on competitive agglomeration and soft rejection of outliers
-
IEEE, Los Alamitos
-
Frigui, H., Krishnapuram, R.: A robust clustering algorithm based on competitive agglomeration and soft rejection of outliers. In: Proc. of Computer Vision and Pattern Recognition, vol.550. IEEE, Los Alamitos (1996)
-
(1996)
Proc. of Computer Vision and Pattern Recognition
, vol.550
-
-
Frigui, H.1
Krishnapuram, R.2
-
18
-
-
38149089416
-
Automated classification and analysis of internet malware
-
RAID 2007, Kruegel, C., Lippmann, R., Clark, A. (eds.), Springer, Heidelberg
-
Bailey, M., Oberheide, J., Andersen, J., Mao, Z., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol.4637, pp. 178-197. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4637
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.4
Jahanian, F.5
Nazario, J.6
-
19
-
-
51849162587
-
Common pitfalls using the normalized compression distance
-
Cebrian, M., Alfonseca, M., Ortega, A.: Common pitfalls using the normalized compression distance. Comm. in Information and Systems 5(4), 367-384 (2005)
-
(2005)
Comm. in Information and Systems
, vol.5
, Issue.4
, pp. 367-384
-
-
Cebrian, M.1
Alfonseca, M.2
Ortega, A.3
-
20
-
-
38949156579
-
Linear-time computation of similarity measures for sequential data
-
Rieck, K., Laskov, P.: Linear-time computation of similarity measures for sequential data. Journal of Machine Learning Research 9, 23-48 (2008)
-
(2008)
Journal of Machine Learning Research
, vol.9
, pp. 23-48
-
-
Rieck, K.1
Laskov, P.2
-
21
-
-
77951289154
-
Measuring similarity of malware behavior
-
IEEE Computer Society Press, Los Alamitos (
-
Apel, M., Bockermann, C., Meier, M.: Measuring similarity of malware behavior. In: Proc. of 34th LCN 2009. IEEE Computer Society Press, Los Alamitos (2009)
-
(2009)
Proc. of 34th LCN 2009
-
-
Apel, M.1
Bockermann, C.2
Meier, M.3
-
22
-
-
0001704377
-
On-line construction of suffix trees
-
Ukkonen, E.: On-line construction of suffix trees. Algorithmica 14(3), 249-260 (1995)
-
(1995)
Algorithmica
, vol.14
, Issue.3
, pp. 249-260
-
-
Ukkonen, E.1
-
23
-
-
26444432211
-
Improving the efficiency of misuse detection
-
DIMVA 2005, Julisch, K., Krügel, C. (eds.), Springer, Heidelberg
-
Meier, M., Schmerl, S., Koenig, H.: Improving the Efficiency of Misuse Detection. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol.3548, pp. 188-205. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3548
, pp. 188-205
-
-
Meier, M.1
Schmerl, S.2
Koenig, H.3
-
24
-
-
33746646762
-
Requirements of information reductions for cooperating intrusion detection agents
-
ETRICS 2006, Müller, G. (ed.), Springer, Heidelberg
-
Flegel, U., Biskup, J.: Requirements of information reductions for cooperating intrusion detection agents. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol.3995, pp. 466-480. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3995
, pp. 466-480
-
-
Flegel, U.1
Biskup, J.2
-
26
-
-
77955044938
-
-
MyNetWatchman: MyNetWatchman website (2008), http://www.mynetwatchman.com
-
(2008)
MyNetWatchman Website
-
-
-
27
-
-
85081770459
-
The internet motion sensor - A distributed blackhole monitoring system
-
The Internet Society
-
Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D.: The internet motion sensor - a distributed blackhole monitoring system. In: Proc. of NDSS 2005, The Internet Society, pp. 167-179 (2005)
-
(2005)
Proc. of NDSS 2005
, pp. 167-179
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
29
-
-
16344396406
-
Monitoring and early warning for internet worms
-
Zou, C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proc. of ACM CCS 2003, pp. 190-199 (2003)
-
(2003)
Proc. of ACM CCS
, pp. 190-199
-
-
Zou, C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
31
-
-
38349051945
-
Applying machine learning techniques for detection of malicious code in network traffic
-
KI 2007, Hertzberg, J., Beetz, M., Englert, R. (eds.), Springer, Heidelberg
-
Elovici, Y., Shabtai, A., Moskovitch, R., Tahan, G., Glezer, C.: Applying machine learning techniques for detection of malicious code in network traffic. In: Hertzberg, J., Beetz, M., Englert, R. (eds.) KI 2007. LNCS (LNAI), vol.4667, pp. 44-50. Springer, Heidelberg (2007)
-
(2007)
LNCS (LNAI)
, vol.4667
, pp. 44-50
-
-
Elovici, Y.1
Shabtai, A.2
Moskovitch, R.3
Tahan, G.4
Glezer, C.5
-
32
-
-
24944591774
-
Adwice - Anomaly detection with real-time incremental clustering
-
ICISC 2004, Park, C.-s., Chee, S. (eds.), Springer, Heidelberg
-
Burbeck, K., Nadjm-Therani, S.: Adwice - anomaly detection with real-time incremental clustering. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol.3506, pp. 407-424. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3506
, pp. 407-424
-
-
Burbeck, K.1
Nadjm-Therani, S.2
|