-
4
-
-
85076925998
-
Not-a-bot: Improving service availability in the face of botnet attacks
-
USENIX Association Berkeley, CA, USA
-
R. Gummadi, H. Balakrishnan, P. Maniatis, and S. Ratnasamy Not-a-bot: improving service availability in the face of botnet attacks NSDI'09: proceedings of the 6th USENIX symposium on networked systems design and implementation 2009 USENIX Association Berkeley, CA, USA 307 320
-
(2009)
NSDI'09: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation
, pp. 307-320
-
-
Gummadi, R.1
Balakrishnan, H.2
Maniatis, P.3
Ratnasamy, S.4
-
6
-
-
34147151570
-
-
J. Ilonen Keystroke dynamics 2003 http://www2.it.lut.fi/kurssit/03-04/ 010970000/seminars/Ilonen.pdf
-
(2003)
Keystroke Dynamics
-
-
Ilonen, J.1
-
7
-
-
0000545946
-
Improvements to Platt's SMO algorithm for SVM classifier design
-
DOI 10.1162/089976601300014493
-
S. Keerthi, S. Shevade, C. Bhattacharyya, and K. Murthy Improvements to platt's smo algorithm for SVM classifier design Neural Computation 13 3 2001 637 649 (Pubitemid 33595014)
-
(2001)
Neural Computation
, vol.13
, Issue.3
, pp. 637-649
-
-
Keerthi, S.S.1
Shevade, S.K.2
Bhattacharyya, C.3
Murthy, K.R.K.4
-
8
-
-
84856023177
-
-
Lkl linux keylogger, http://sourceforge.net/projects/lkl/; 2001.
-
(2001)
Lkl Linux Keylogger
-
-
-
9
-
-
84856018754
-
-
Kernel Based Keylogger
-
Kernel Based Keylogger. http://packetstormsecurity.org/UNIX/security/; 2001.
-
(2001)
-
-
-
10
-
-
56549092419
-
The effect of clock resolution on keystroke dynamics
-
R. Lippmann, E. Kirda, A. Trachtenberg, Lecture notes in computer science Springer
-
K.S. Killourhy, and R.A. Maxion The effect of clock resolution on keystroke dynamics R. Lippmann, E. Kirda, A. Trachtenberg, RAID Lecture notes in computer science vol. 5230 2008 Springer 331 350
-
(2008)
RAID
, vol.5230
, pp. 331-350
-
-
Killourhy, K.S.1
Maxion, R.A.2
-
11
-
-
78249240878
-
Why did my detector do that?! predicting keystroke-dynamics error rates
-
Lecture notes in computer science
-
K. Killourhy, and R. Maxion Why did my detector do that?! predicting keystroke-dynamics error rates Proceedings of the Recent Advances in Intrusion detection (RAID) Lecture notes in computer science vol. 6307 2010 256 276
-
(2010)
Proceedings of the Recent Advances in Intrusion Detection (RAID)
, vol.6307
, pp. 256-276
-
-
Killourhy, K.1
Maxion, R.2
-
12
-
-
84856019327
-
-
rd, writing linux kernel keylogger
-
rd, writing linux kernel keylogger, Phrack Magazine 12(14), http://freeworld.thc.org/papers/writing-linux-kernel-keylogger.txt; 2001.
-
(2001)
Phrack Magazine
, vol.12
, Issue.14
-
-
-
13
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
DOI 10.1016/S0167-739X(99)00059-X
-
F. Monrose, and A. Rubin Keystroke dynamics as a biometric for authentication Future Generation Computer Systems 16 4 2000 351 359 (Pubitemid 30552905)
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
15
-
-
78249243406
-
Bait your hook: A novel detection technique for keyloggers
-
S. Jha, R. Sommer, C. Kreibich, Lecture notes in computer science Springer
-
S. Ortolani, C. Giuffrida, and B. Crispo Bait your hook: a novel detection technique for keyloggers S. Jha, R. Sommer, C. Kreibich, RAID Lecture notes in computer science vol. 6307 2010 Springer 198 217
-
(2010)
RAID
, vol.6307
, pp. 198-217
-
-
Ortolani, S.1
Giuffrida, C.2
Crispo, B.3
-
17
-
-
0003120218
-
Fast training of support vector machines using sequential minimal optimization
-
Ch. 12
-
Platt J, Fast training of support vector machines using sequential minimal optimization, in: Advances in kernel methods - support vector learning, 1998, Ch. 12.
-
(1998)
Advances in Kernel Methods - Support Vector Learning
-
-
Platt, J.1
-
18
-
-
20444496997
-
-
C.E. Brodley, P. Chan, R. Lippman, W. Yurcik, VizSEC, ACM
-
M. Pusara, and C.E. Brodley C.E. Brodley, P. Chan, R. Lippman, W. Yurcik, User re-authentication via mouse movements 2004 VizSEC, ACM 1 8
-
(2004)
User Re-authentication Via Mouse Movements
, pp. 1-8
-
-
Pusara, M.1
Brodley, C.E.2
-
19
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
USENIX
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn Design and implementation of a TCG-based integrity measurement architecture USENIX security symposium 2004 USENIX 223 238
-
(2004)
USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
20
-
-
77950555884
-
The user is not the enemy: Fighting malware by tracking user intentions
-
ACM New York, NY, USA
-
J. Shirley, and D. Evans The user is not the enemy: fighting malware by tracking user intentions NSPW '08: proceedings of the 2008 workshop on new security paradigms 2008 ACM New York, NY, USA 33 45 http://doi.acm.org/10.1145/ 1595676.1595683
-
(2008)
NSPW '08: Proceedings of the 2008 Workshop on New Security Paradigms
, pp. 33-45
-
-
Shirley, J.1
Evans, D.2
-
24
-
-
60649107135
-
Soft-timer driven transient kernel control flow attacks and defense
-
IEEE Computer Society Washington, DC, USA
-
J. Wei, B.D. Payne, J. Giffin, and C. Pu Soft-timer driven transient kernel control flow attacks and defense ACSAC '08: proceedings of the 2008 annual computer security applications conference 2008 IEEE Computer Society Washington, DC, USA 97 107 http://dx.doi.org/10.1109/ACSAC.2008.40
-
(2008)
ACSAC '08: Proceedings of the 2008 Annual Computer Security Applications Conference
, pp. 97-107
-
-
Wei, J.1
Payne, B.D.2
Giffin, J.3
Pu, C.4
-
26
-
-
76549113940
-
User-assisted host-based detection of outbound malware traffic
-
Xiong H, Malhotra P, Stefan D, Wu C, Yao D. User-assisted host-based detection of outbound malware traffic, in: Proceedings of International Conference on Information and Communications Security (ICICS), 2009.
-
(2009)
Proceedings of International Conference on Information and Communications Security (ICICS)
-
-
Xiong, H.1
Malhotra, P.2
Stefan, D.3
Wu, C.4
Yao, D.5
-
29
-
-
79959957319
-
Peeping Tom in the neighborhood: Keystroke eavesdropping on multi-user systems
-
Zhang K, Wang X. Peeping Tom in the neighborhood: keystroke eavesdropping on multi-user systems, in: proceedings of the USENIX security symposium, 2009.
-
(2009)
Proceedings of the USENIX Security Symposium
-
-
Zhang, K.1
Wang, X.2
|