-
1
-
-
21644482790
-
Worm detection, early warning and response based on local victim information
-
Dec. 6-10, IEEE Xplore Press, DOI: 10.1109/CSAC.2004.51
-
Gu, G., M. Sharif, X. Qin, D. Dagon, W. Lee and G. Riley, 2004. Worm detection, early warning and response based on local victim information. Proceedings of the 20th Annual Computer Security Applications Conference, Dec. 6-10, IEEE Xplore Press, pp: 136-145. DOI: 10.1109/CSAC.2004.51
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference
, pp. 136-145
-
-
Gu, G.1
Sharif, M.2
Qin, X.3
Dagon, D.4
Lee, W.5
Riley, G.6
-
2
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
USENIX Association Berkeley, CA, USA
-
Kim, H.A. and B. Karp, 2004. Autograph: Toward automated, distributed worm signature detection. Proceedings of the 13th conference on USENIX Security Symposium (SSYM'04), USENIX Association Berkeley, CA, USA., pp: 19-19.
-
(2004)
Proceedings of the 13th conference on USENIX Security Symposium (SSYM'04)
, pp. 19-119
-
-
Kim, H.A.1
Karp, B.2
-
3
-
-
33751064824
-
Hamsa: Fast signature generation for zeroday polymorphicworms with provable attack resilience
-
May 21-24, Berkeley/Oakland, California
-
Li, Z., M. Sanghi, Y. Chen, M. Y. Kao and B. Chavez, 2006. Hamsa: Fast signature generation for zeroday polymorphicworms with provable attack resilience. Proceedings of the IEEE Symposium on Security and Privacy, May 21-24, Berkeley/Oakland, California, pp: 32-47.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 32-47
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.Y.4
Chavez, B.5
-
4
-
-
42749086128
-
Detection of unknown computer worms based on behavioral classification of the host
-
DOI: 10.1016/j.csda.2008.01.028
-
Moskovitch, R., Y. Elovici and L. Rokach, 2008. Detection of unknown computer worms based on behavioral classification of the host. Comput. Stat. Data Anal., 52: 4544-4566. DOI: 10.1016/j.csda.2008.01.028
-
(2008)
Comput. Stat. Data Anal.
, vol.52
, pp. 4544-4566
-
-
Moskovitch, R.1
Elovici, Y.2
Rokach, L.3
-
5
-
-
19944406146
-
Accurate, scalable in-network identification of p2p traffic using application signatures
-
May 17-22, New York, USA. DOI: 10.1145/988672.988742
-
Sen, S., O. Spatscheck and D. Wang, 2004. Accurate, scalable in-network identification of p2p traffic using application signatures. Proceedings of the 13th international conference on World Wide Web, May 17-22, New York, USA., pp: 512-521. DOI: 10.1145/988672.988742
-
(2004)
Proceedings of the 13th international conference on World Wide Web
, pp. 512-521
-
-
Sen, S.1
Spatscheck, O.2
Wang, D.3
-
6
-
-
80053255756
-
Increasing effectiveness of ids to improve security in intranet
-
DOI: 10.3844/ajassp.2005.1032.1035
-
Singh, U.K., A.K. Ramani, N.S. Chaudhari and V. Gupta, 2005. Increasing effectiveness of ids to improve security in intranet. Am. J. Applied Sci., 2: 1032-1035. DOI: 10.3844/ajassp.2005.1032.1035
-
(2005)
Am. J. Applied Sci.
, vol.2
, pp. 1032-1035
-
-
Singh, U.K.1
Ramani, A.K.2
Chaudhari, N.S.3
Gupta, V.4
-
7
-
-
83755187536
-
Improving worm detection with artificial neural networks through feature selection and temporal analysis techniques
-
Stopel, D., Z. Boger, R. Moskovitch, Y. Shahar and Y. Elovici, 2006. Improving worm detection with artificial neural networks through feature selection and temporal analysis techniques. Int. J. Applied Math. Comput. Sci., 1: 34-40.
-
(2006)
Int. J. Applied Math. Comput. Sci.
, vol.1
, pp. 34-40
-
-
Stopel, D.1
Boger, Z.2
Moskovitch, R.3
Shahar, Y.4
Elovici, Y.5
-
8
-
-
77956489422
-
An automatic application signature construction system for unknown traffic
-
DOI: 10.1002/cpe.1603
-
Wang, Y., Y. Xiang and S. Z. Yu, 2010. An automatic application signature construction system for unknown traffic. Concurrency Comput.: Practice Experience, 22: 1927-1944. DOI: 10.1002/cpe.1603
-
(2010)
Concurrency Comput.: Practice Experience
, vol.22
, pp. 1927-1944
-
-
Wang, Y.1
Xiang, Y.2
Yu, S.Z.3
|