-
3
-
-
80052179046
-
Korset: Automated, Zero False-Alarm Intrusion Detection for Linux
-
O. Ben-Cohen, A. Wool, Korset: Automated, Zero False-Alarm Intrusion Detection for Linux, Linux Symposium, pp. 31, 2008.
-
(2008)
Linux Symposium
, pp. 31
-
-
Ben-Cohen, O.1
Wool, A.2
-
4
-
-
48749120519
-
Intrusion Detection System using Self Organizing Maps
-
L. Vokorokos, A. Balaz, M.Chovanec, Intrusion Detection System using Self Organizing Maps, Acta Electrotechnica et Informatica No. 1, pp. 1-5, 2006.
-
(2006)
Acta Electrotechnica et Informatica
, Issue.1
, pp. 1-5
-
-
Vokorokos, L.1
Balaz, A.2
Chovanec, M.3
-
7
-
-
34548849471
-
Design and Implementation of Secure Auditing System in Linux Kernel
-
K. Zhao, Q. Li, J. Kang, D. Jiang, L. Hu, Design and Implementation of Secure Auditing System in Linux Kernel, IEEE Workshop on Anticounterfeiting, Security, Identification, pp. 232-236, 2007.
-
(2007)
IEEE Workshop on Anticounterfeiting, Security, Identification
, pp. 232-236
-
-
Zhao, K.1
Li, Q.2
Kang, J.3
Jiang, D.4
Hu, L.5
-
8
-
-
74049118754
-
Robust Signatures for Kernel Data Structures
-
B. Dolan-Gavitt , A. Srivastava , P. Traynor , J. Giffin, Robust Signatures for Kernel Data Structures, ACM Conference on Computer and Communications Security, pp. 566-577, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 566-577
-
-
Dolan-Gavitt, B.1
Srivastava, A.2
Traynor, P.3
Giffin, J.4
-
9
-
-
0029716418
-
A Sense of Self for Unix Processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, T. A. Longstaff, A Sense of Self for Unix Processes, IEEE Symposium on Security and Privacy, pp. 120-128, 1996.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
10
-
-
80052172225
-
Detecting Worms via Mining Ddynamic Program Execution
-
W. Xun, Y. Wei, A. Champion, F. Xinwen, X. Dong, Detecting Worms via Mining Ddynamic Program Execution, International Conference on Security and Privacy in Communication Networks and the Workshops, pp. 412-421, 2007.
-
(2007)
International Conference on Security and Privacy in Communication Networks and the Workshops
, pp. 412-421
-
-
Xun, W.1
Wei, Y.2
Champion, A.3
Xinwen, F.4
Dong, X.5
-
11
-
-
0142222738
-
Detection and Classification of Intrusions and Faults using Sequences of System Calls
-
J. B. D. Cabrera, L. Lewis, R. K. Mehra, Detection and Classification of Intrusions and Faults using Sequences of System Calls, ACM SIGMOD Record, vol.30, no.4, pp. 25-34, 2001.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 25-34
-
-
Cabrera, J.B.D.1
Lewis, L.2
Mehra, R.K.3
-
13
-
-
33745644031
-
Environment-sensitive Intrusion Detection
-
Jonathon T. Giffin, D. Dagon, S. Jha, W. Lee, B. P. Miller, Environment-sensitive Intrusion Detection, International Conference on Recent Advances in Intrusion Detection, pp.185-206, 2006.
-
(2006)
International Conference on Recent Advances in Intrusion Detection
, pp. 185-206
-
-
Giffin, J.T.1
Dagon, D.2
Jha, S.3
Lee, W.4
Miller, B.P.5
-
14
-
-
3543086916
-
Formalizing Sensitivity in Static Analysis for Intrusion Detection
-
H. H. Feng, J. T. Giffin, Y. Huang, S. Jha, W. Lee, B. P. Miller, Formalizing Sensitivity in Static Analysis for Intrusion Detection, IEEE Symposium on Security and Privacy, pp. 194-208, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 194-208
-
-
Feng, H.H.1
Giffin, J.T.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.P.6
-
17
-
-
74049088532
-
Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection
-
F. Ahmed, H. Hameed, M. Z. Shafiq, M. Farooq, Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection, ACM workshop on Security and Artificial Intelligence, pp. 55-62, 2009.
-
(2009)
ACM Workshop on Security and Artificial Intelligence
, pp. 55-62
-
-
Ahmed, F.1
Hameed, H.2
Shafiq, M.Z.3
Farooq, M.4
|