-
1
-
-
33750274501
-
Robust reactions to potential day-zero worms through cooperation and validation
-
Information Security - 9th International Conference, ISC 2006, Proceedings
-
Anagnostakis, K.G., Greenwald, M.B., Ioannidis, S., Keromytis, A.D.: Robust Reactions to Potential Day-Zero Worms through Cooperation and Validation. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 427-442. Springer, Heidelberg (2006) (Pubitemid 44609964)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4176 LNCS
, pp. 427-442
-
-
Anagnostakis, K.1
Ioannidis, S.2
Keromytis, A.D.3
Greenwald, M.B.4
-
2
-
-
84890863223
-
A Cooperative Immunization System for an Untrusting Internet
-
Anagnostakis, K.G., Greenwald, M.B., Ioannidis, S., Keromytis, A.D., Li, D.: A Cooperative Immunization System for an Untrusting Internet. In: IEEE International Conference on Networks (2003)
-
(2003)
IEEE International Conference on Networks
-
-
Anagnostakis, K.G.1
Greenwald, M.B.2
Ioannidis, S.3
Keromytis, A.D.4
Li, D.5
-
3
-
-
0014814325
-
Space/time trade-offs in Hash Coding with Allowable Errors
-
Bloom, B.H.: Space/time trade-offs in Hash Coding with Allowable Errors. Communications of the ACM 13(7), 422-426 (1970)
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
4
-
-
78651496475
-
Experimental results of crosssite exchange of web content anomaly detector alerts
-
November
-
Boggs, N., Hiremagalore, S., Stavrou, A., Stolfo, S.J.: Experimental results of crosssite exchange of web content anomaly detector alerts. In: IEEE Conference on Technologies for Homeland Security, HST 2010, pp. 8-14 (November 2010)
-
(2010)
IEEE Conference on Technologies for Homeland Security, HST 2010
, pp. 8-14
-
-
Boggs, N.1
Hiremagalore, S.2
Stavrou, A.3
Stolfo, S.J.4
-
5
-
-
50249170401
-
Casting out demons: Sanitizing training data for anomaly sensors
-
May
-
Cretu, G., Stavrou, A., Locasto, M., Stolfo, S., Keromytis, A.: Casting out demons: Sanitizing training data for anomaly sensors. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 81-95 (May 2008)
-
(2008)
IEEE Symposium on Security and Privacy, SP 2008
, pp. 81-95
-
-
Cretu, G.1
Stavrou, A.2
Locasto, M.3
Stolfo, S.4
Keromytis, A.5
-
6
-
-
76649108863
-
Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating
-
Balzarotti, D. (ed.) RAID 2009. Springer, Heidelberg
-
Cretu-Ciocarlie, G., Stavrou, A., Locasto, M., Stolfo, S.: Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating. In: Balzarotti, D. (ed.) RAID 2009. LNCS, vol. 5758, pp. 41-60. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5758
, pp. 41-60
-
-
Cretu-Ciocarlie, G.1
Stavrou, A.2
Locasto, M.3
Stolfo, S.4
-
7
-
-
51249124924
-
Distributed and collaborative intrusion detection systems
-
May
-
Farroukh, A., Mukadam, N., Bassil, E., Elhajj, I.: Distributed and collaborative intrusion detection systems. In: IEEE Lebanon Communications Workshop, LCW 2008, pp. 41-45 (May 2008)
-
(2008)
IEEE Lebanon Communications Workshop, LCW 2008
, pp. 41-45
-
-
Farroukh, A.1
Mukadam, N.2
Bassil, E.3
Elhajj, I.4
-
11
-
-
33750368839
-
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
-
ACM, New York
-
Kumar, S., Dharmapurikar, S., Yu, F., Crowley, P., Turner, J.: Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 339-350. ACM, New York (2006)
-
(2006)
Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 339-350
-
-
Kumar, S.1
Dharmapurikar, S.2
Yu, F.3
Crowley, P.4
Turner, J.5
-
12
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
Lazarevic, A., Ozgur, A., Ertoz, L., Srivastava, J., Kumar, V.: A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the Third SIAM International Conference on Data Mining (2003)
-
(2003)
Proceedings of the Third SIAM International Conference on Data Mining
-
-
Lazarevic, A.1
Ozgur, A.2
Ertoz, L.3
Srivastava, J.4
Kumar, V.5
-
13
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions and reversals
-
Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics Doklady 10(8), 707-710 (1966);
-
(1966)
Soviet Physics Doklady
, vol.10
, Issue.8
, pp. 707-710
-
-
Levenshtein, V.I.1
-
15
-
-
68849119999
-
Using string matching for deep packet inspection
-
Lin, P., Lin, Y., Lee, T., Lai, Y.: Using string matching for deep packet inspection. Computer 41(4), 23-28 (2008)
-
(2008)
Computer
, vol.41
, Issue.4
, pp. 23-28
-
-
Lin, P.1
Lin, Y.2
Lee, T.3
Lai, Y.4
-
16
-
-
33745469273
-
Towards Collaborative Security and P2P Intrusion Detection
-
Locasto, M.E., Parekh, J.J., Keromytis, A.D., Stolfo, S.J.: Towards Collaborative Security and P2P Intrusion Detection. In: IEEE Information Assurance Workshop. West Point, NY (2005)
-
(2005)
IEEE Information Assurance Workshop. West Point, NY
-
-
Locasto, M.E.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
21
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
Sommer, R., Paxson, V.: Outside the closed world: On using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy, pp. 305-316 (2010)
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
23
-
-
41549098765
-
On the infeasibility of modeling polymorphic shellcode
-
ACM, New York
-
Song, Y., Locasto, M.E., Stavrou, A., Keromytis, A.D., Stolfo, S.J.: On the infeasibility of modeling polymorphic shellcode. In: Proceedings of the 14th ACM Conference on Computer and Communications Security CCS 2007, pp. 541-551. ACM, New York (2007), http://doi.acm.org/10.1145/1315245.1315312
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security CCS 2007
, pp. 541-551
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
24
-
-
0000949239
-
GrIDS - A Graph Based Intrusion Detection System for Large Networks
-
Staniford-Chen, S., Cheung, S., Crawford, R., Dilger, M.: GrIDS - A Graph Based Intrusion Detection System for Large Networks. In: National Information Computer Security Conference, Baltimore, MD (1996)
-
(1996)
National Information Computer Security Conference, Baltimore, MD
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
-
25
-
-
74049136397
-
Keep your friends close: The necessity for updating an anomaly sensor with legitimate environment changes
-
ACM, New York
-
Stavrou, A., Cretu-Ciocarlie, G.F., Locasto, M.E., Stolfo, S.J.: Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. In: AISec 2009: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, pp. 39-46. ACM, New York (2009)
-
(2009)
AISec 2009: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence
, pp. 39-46
-
-
Stavrou, A.1
Cretu-Ciocarlie, G.F.2
Locasto, M.E.3
Stolfo, S.J.4
-
27
-
-
74049100062
-
Hierarchical distributed alert correlation model
-
IEEE Computer Society, Washington, DC, USA
-
Tian, D., Changzhen, H., Qi, Y., Jianqiao, W.: Hierarchical distributed alert correlation model. In: IAS 2009: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security, pp. 765-768. IEEE Computer Society, Washington, DC, USA (2009)
-
(2009)
IAS 2009: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security
, pp. 765-768
-
-
Tian, D.1
Changzhen, H.2
Qi, Y.3
Jianqiao, W.4
-
29
-
-
76649131237
-
Regular expression matching on graphics hardware for intrusion detection
-
Balzarotti, D. (ed.) RAID 2009. Springer, Heidelberg
-
Vasiliadis, G., Polychronakis,M., Antonatos, S.,Markatos, E., Ioannidis, S.: Regular expression matching on graphics hardware for intrusion detection. In: Balzarotti, D. (ed.) RAID 2009. LNCS, vol. 5758, pp. 265-283. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5758
, pp. 265-283
-
-
Vasiliadis, G.1
Polychronakis, M.2
Antonatos, S.3
Markatos, E.4
Ioannidis, S.5
-
30
-
-
21644441634
-
An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks
-
Vigna, G., Gwalani, S., Srinivasan, K., Belding-Royer, E.M., Kemmerer, R.A.: An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks. In: Computer Security Applications Conference (2004)
-
(2004)
Computer Security Applications Conference
-
-
Vigna, G.1
Gwalani, S.2
Srinivasan, K.3
Belding-Royer, E.M.4
Kemmerer, R.A.5
-
31
-
-
35348910615
-
Anagram: A Content Anomaly Detector Resistant toMimicry Attack
-
Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A Content Anomaly Detector Resistant toMimicry Attack. In: Symposium on Recent Advances in Intrusion Detection, Hamburg, Germany (2006)
-
Symposium on Recent Advances in Intrusion Detection, Hamburg, Germany (2006)
-
-
Wang, K.1
Parekh, J.J.2
Stolfo, S.J.3
-
32
-
-
84857332734
-
-
Websense: LizaMoon, http://community.websense.com/blogs/securitylabs/ archive/2011/03/31/update-on-lizamoon-mass-injection.aspx
-
LizaMoon
-
-
-
33
-
-
33746644985
-
Privacy-preserving alert correlation: A concept hierarchy based approach
-
December
-
Xu, D., Ning, P.: Privacy-preserving alert correlation: a concept hierarchy based approach. In: 21st Annual Computer Security Applications Conference, pp. 10-546 (December 2005)
-
(2005)
21st Annual Computer Security Applications Conference
, pp. 10-546
-
-
Xu, D.1
Ning, P.2
-
34
-
-
85137546697
-
Global Intrusion Detection in the DOMINO Overlay System
-
Yegneswaran, V., Barford, P., Jha, S.: Global Intrusion Detection in the DOMINO Overlay System. In: NDSS (2004)
-
(2004)
NDSS
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
|