-
3
-
-
84885886239
-
Security: Spyware and rootkits
-
December 2004
-
Butler, J., Sherri, S.: Security: Spyware and Rootkits. In: Login, December 2004, vol. 29(6) (2004)
-
(2004)
Login
, vol.29
, Issue.6
-
-
Butler, J.1
Sherri, S.2
-
4
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Clark, D.D., Wilson, D.R.: A Comparison of Commercial and Military Computer Security Policies. In: IEEE Symposium on Security and Privacy, pp. 184-194 (1987)
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
5
-
-
84858694820
-
Cayuga: A general purpose event monitoring system
-
Demers, A., Gehrke, J., Hong, M., Panda, B., Riedewald, M., Sharma, V., White, W.: Cayuga: A General Purpose Event Monitoring System. In: CIDR, pp. 412-422 (2007)
-
(2007)
CIDR
, pp. 412-422
-
-
Demers, A.1
Gehrke, J.2
Hong, M.3
Panda, B.4
Riedewald, M.5
Sharma, V.6
White, W.7
-
6
-
-
33644565261
-
Polymorphic shellcode engine using spectrum analysis
-
Detristan, T., Ulenspiegel, T., Malcom, Y., Von Underduk, M.S.: Polymorphic Shellcode Engine Using Spectrum Analysis. Phrack 11, 61-69 (2003)
-
(2003)
Phrack
, vol.11
, pp. 61-69
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Von Underduk, M.S.4
-
7
-
-
70450076401
-
-
Department of Computer Science, University of Calgary, TR 2007-873-25 July
-
Friess, N., Aycock, J.: Black Market Botnets. Department of Computer Science, University of Calgary, TR 2007-873-25 (July 2007)
-
(2007)
Black Market Botnets
-
-
Friess, N.1
Aycock, J.2
-
8
-
-
84885883837
-
Handling today's tough security threats
-
Hoang, M.: Handling Today's Tough Security Threats. Symantec Security Response (2006)
-
(2006)
Symantec Security Response
-
-
Hoang, M.1
-
11
-
-
84885888847
-
-
Honeypot Mailing List, Security Focus, http://www.securityfocus.com/ archive/119
-
Honeypot Mailing List
-
-
-
13
-
-
84885887050
-
From riches to prison: Hackers rig stock prices
-
September
-
Kravets, D.: From Riches to Prison: Hackers Rig Stock Prices. Wired Blog Network (September 2008)
-
(2008)
Wired Blog Network
-
-
Kravets, D.1
-
14
-
-
84885892955
-
Web fraud 2.0: Validating your stolen goods
-
August 20
-
Krebs, B.: Web Fraud 2.0: Validating Your Stolen Goods. The Washington Post (August 20, 2008)
-
(2008)
The Washington Post
-
-
Krebs, B.1
-
15
-
-
38049030703
-
A study of malcode-bearing documents
-
Hämmerli, B.M., Sommer, R. (eds.) LNCS Springer, Heidelberg
-
Li, W., Stolfo, S.J., Stavrou, A., Androulaki, E., Keromytis, A.: A Study of Malcode-Bearing Documents. In: Hämmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 231-250. Springer, Heidelberg (2007)
-
(2007)
DIMVA 2007
, vol.4579
, pp. 231-250
-
-
Li, W.1
Stolfo, S.J.2
Stavrou, A.3
Androulaki, E.4
Keromytis, A.5
-
16
-
-
38349036494
-
ELICIT: A system for detecting insiders who violate need-to-know
-
Kruegel, C., Lippmann, R., Clark, A. (eds.) LNCS Springer, Heidelberg
-
Maloof, M., Stephens, G.D.: ELICIT: A System for Detecting Insiders Who Violate Need-to-know. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 146-166. Springer, Heidelberg (2007)
-
(2007)
RAID 2007
, vol.4637
, pp. 146-166
-
-
Maloof, M.1
Stephens, G.D.2
-
18
-
-
84885894032
-
-
Orbiscom, http://www.orbiscom.com/
-
-
-
-
21
-
-
41549098765
-
On the in-feasibility of modeling polymorphic shellcode
-
Song, Y., Locasto, M.E., Stavrou, A., Keromytis, A.D., Stolfo, S.J.: On the in-feasibility of modeling polymorphic shellcode. In: Proceedings of the 14th ACM conference on Computer and communications security (CCS 2007), pp. 541-551 (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007)
, pp. 541-551
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
22
-
-
84944727480
-
Honeypots: Catching the insider threat
-
Las Vegas December
-
Spitzner, L.: Honeypots: Catching the Insider Threat. In: Proceedings of ACSAC, Las Vegas (December 2003)
-
(2003)
Proceedings of ACSAC
-
-
Spitzner, L.1
-
23
-
-
15944378973
-
Honeytokens: The other honeypot
-
Spitzner, L.: Honeytokens: The Other Honeypot. Security Focus (2003)
-
(2003)
Security Focus
-
-
Spitzner, L.1
-
25
-
-
69249090883
-
-
Symantec Trends for July-December 2007 April
-
Symantec. Global Internet Security Threat Report, Trends for July-December 2007 (April 2008)
-
(2008)
Global Internet Security Threat Report
-
-
-
26
-
-
84904794911
-
Social honeypots: Making friends with a spammer near you
-
Mountain View, CA August
-
Webb, S., Caverlee, J., Pu, C.: Social Honeypots: Making Friends with a Spammer Near You. In: Proceedings of the Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA (August 2008)
-
(2008)
Proceedings of the Fifth Conference on Email and Anti-spam (CEAS 2008)
-
-
Webb, S.1
Caverlee, J.2
Pu, C.3
-
27
-
-
0003201842
-
Markov chain model of temporal behavior for anomaly detection
-
United States Military Academy, West Point, NY, June 2000
-
Ye, N.: Markov Chain Model of Temporal Behavior for Anomaly Detection. In: Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, June 2000, pp. 171-174 (2000)
-
(2000)
Proceedings of the 2000 IEEE Workshop on Information Assurance and Security
, pp. 171-174
-
-
Ye, N.1
-
28
-
-
70350026813
-
Using deception to hide things from hackers: Processes, principles, and techniques
-
Yuill, J., Denning, D., Feer, F.: Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques. Journal of Information Warfare 5(3), 26-40 (2006)
-
(2006)
Journal of Information Warfare
, vol.5
, Issue.3
, pp. 26-40
-
-
Yuill, J.1
Denning, D.2
Feer, F.3
-
29
-
-
15944397574
-
Honeyfiles: Deceptive files for intrusion detection
-
United States Military Academy, West Point, NY, June 2004
-
Yuill, J., Zappe, M., Denning, D., Feer, F.: Honeyfiles: Deceptive Files for Intrusion Detection. In: Proceedings of the 2004 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, June 2004, pp. 116-122 (2004)
-
(2004)
Proceedings of the 2004 IEEE Workshop on Information Assurance
, pp. 116-122
-
-
Yuill, J.1
Zappe, M.2
Denning, D.3
Feer, F.4
|