-
3
-
-
84864224145
-
-
Top 10 Blocked URLs and Domains. http://us.trendmicro.com/us/trendwatch/ current-threat-activity/malicious-url-info/top10-blocked-urls-domains/.
-
Top 10 Blocked URLs and Domains
-
-
-
9
-
-
58049219641
-
Mining specifications of malicious behavior
-
G. Shroff, P. Jalote, and S. K. Rajamani, editors, ACM
-
M. Christodorescu, S. Jha, and C. Kruegel. Mining specifications of malicious behavior. In G. Shroff, P. Jalote, and S. K. Rajamani, editors, ISEC, pages 5-14. ACM, 2008.
-
(2008)
ISEC
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
14
-
-
73849140516
-
Preventing history forgery with secure provenance
-
R. Hasan, R. Sion, and M. Winslett. Preventing history forgery with secure provenance. TOS, 5(4), 2009.
-
(2009)
TOS
, vol.5
, Issue.4
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
15
-
-
0024984013
-
A network security monitor
-
May
-
L. T. Heberlein, G. V. Dias, K. N. Levitt, B. Mukherjee, J. Wood, and D. Wolber. A network security monitor. In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pages 296-304, May 1990.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, L.T.1
Dias, G.V.2
Levitt, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
16
-
-
70349276980
-
Privacy oracle: A system for finding application leaks with black box differential testing
-
J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis, and T. Kohno. Privacy oracle: a system for finding application leaks with black box differential testing. In Proceedings of Computer and Communications Security (CCS), 2008.
-
Proceedings of Computer and Communications Security (CCS), 2008
-
-
Jung, J.1
Sheth, A.2
Greenstein, B.3
Wetherall, D.4
Maganis, G.5
Kohno, T.6
-
17
-
-
51849103380
-
Using dependency tracking to provide explanations for policy management
-
L. Kagal, C. Hanson, and D. J. Weitzner. Using dependency tracking to provide explanations for policy management. In POLICY, pages 54-61, 2008.
-
(2008)
POLICY
, pp. 54-61
-
-
Kagal, L.1
Hanson, C.2
Weitzner, D.J.3
-
18
-
-
42949087970
-
Algorithms for storytelling
-
D. Kumar, N. Ramakrishnan, R. F. Helm, and M. Potts. Algorithms for storytelling. IEEE Trans. Knowl. Data Eng., 20(6):736-751, 2008.
-
(2008)
IEEE Trans. Knowl. Data Eng.
, vol.20
, Issue.6
, pp. 736-751
-
-
Kumar, D.1
Ramakrishnan, N.2
Helm, R.F.3
Potts, M.4
-
19
-
-
80053902649
-
Discovering excitatory relationships using dynamic bayesian networks
-
10.1007/s10115-010-0344-6
-
D. Patnaik, S. Laxman, and N. Ramakrishnan. Discovering excitatory relationships using dynamic bayesian networks. Knowledge and Information Systems, pages 1-31, 2010. 10.1007/s10115-010-0344-6.
-
(2010)
Knowledge and Information Systems
, pp. 1-31
-
-
Patnaik, D.1
Laxman, S.2
Ramakrishnan, N.3
-
23
-
-
0026402266
-
A system for distributed intrusion detection
-
February/March
-
S. R. Snapp, J. Brentano, G. V. Dias, T. L. Goan, T. Grance, L. T. Heberlein, C.-L. Ho, K. N. Levitt, B. Mukherjee, D. L. Mansur, K. L. Pon, and S. E. Smaha. A system for distributed intrusion detection. COMPCOM Spring '91 Digest of Papers, pages 170-176, February/March 1991.
-
(1991)
COMPCOM Spring '91 Digest of Papers
, pp. 170-176
-
-
Snapp, S.R.1
Brentano, J.2
Dias, G.V.3
Goan, T.L.4
Grance, T.5
Heberlein, L.T.6
Ho, C.-L.7
Levitt, K.N.8
Mukherjee, B.9
Mansur, D.L.10
Pon, K.L.11
Smaha, S.E.12
-
26
-
-
0024984441
-
Adaptive real-time anomaly detection using inductively generated sequential patterns
-
H. S. Teng, K. Chen, and S. C.-Y. Lu. Adaptive real-time anomaly detection using inductively generated sequential patterns. Security and Privacy, IEEE Symposium on, 0:278, 1990.
-
(1990)
Security and Privacy, IEEE Symposium on
, vol.0
, pp. 278
-
-
Teng, H.S.1
Chen, K.2
Lu, S.C.-Y.3
-
28
-
-
84890099677
-
A semantic framework for data analysis in networked systems
-
Berkeley, CA, USA, USENIX Association
-
A. Viswanathan, A. Hussain, J. Mirkovic, S. Schwab, and J. Wroclawski. A semantic framework for data analysis in networked systems. In Proceedings of the 8th USENIX conference on Networked systems design and implementation, NSDI'11, pages 10-10, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI'11
, pp. 10
-
-
Viswanathan, A.1
Hussain, A.2
Mirkovic, J.3
Schwab, S.4
Wroclawski, J.5
-
29
-
-
84863028103
-
Data-provenance verification for secure hosts
-
K. Xu, H. Xiong, C. Wu, D. Stefan, and D. Yao. Data-provenance verification for secure hosts. IEEE Transactions on Dependable and Secure Computing, 9:173-183, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, pp. 173-183
-
-
Xu, K.1
Xiong, H.2
Wu, C.3
Stefan, D.4
Yao, D.5
-
31
-
-
32344440051
-
Reasoning about sets using redescription mining
-
R. Grossman, R. J. Bayardo, and K. P. Bennett, editors, ACM
-
M. J. Zaki and N. Ramakrishnan. Reasoning about sets using redescription mining. In R. Grossman, R. J. Bayardo, and K. P. Bennett, editors, KDD, pages 364-373. ACM, 2005.
-
(2005)
KDD
, pp. 364-373
-
-
Zaki, M.J.1
Ramakrishnan, N.2
-
32
-
-
84864236673
-
-
Technical report, Department of Computer Science, Virginia Tech, Blacksburg, Virginia, February
-
H. Zhang, W. Banick, D. Yao, and N. Ramakrishnan. User intentionbased traffic dependence analysis for anomaly detection. Technical report, Department of Computer Science, Virginia Tech, Blacksburg, Virginia, February 2012.
-
(2012)
User Intentionbased Traffic Dependence Analysis for Anomaly Detection
-
-
Zhang, H.1
Banick, W.2
Yao, D.3
Ramakrishnan, N.4
|