Abstract is missing.
- Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory ShadowingRyan Riley, Xuxian Jiang, Dongyan Xu. 1-20 [doi]
- Countering Persistent Kernel Rootkits through Systematic Hook DiscoveryZhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang. 21-38 [doi]
- Tamper-Resistant, Application-Aware Blocking of Malicious Network ConnectionsAbhinav Srivastava, Jonathon T. Giffin. 39-58 [doi]
- A First Step towards Live Botmaster TracebackDaniel Ramsbrock, Xinyuan Wang, Xuxian Jiang. 59-77 [doi]
- A Layered Architecture for Detecting Malicious BehaviorsLorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell. 78-97 [doi]
- A Study of the Packer Problem and Its SolutionsFanglu Guo, Peter Ferrie, Tzi-cker Chiueh. 98-115 [doi]
- Gnort: High Performance Network Intrusion Detection Using Graphics ProcessorsGiorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis. 116-134 [doi]
- Predicting the Resource Consumption of Network Intrusion Detection SystemsHolger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer. 135-154 [doi]
- High-Speed Matching of Vulnerability SignaturesNabil Schear, David R. Albrecht, Nikita Borisov. 155-174 [doi]
- Swarm Attacks against Network-Level Emulation/AnalysisSimon P. Chung, Aloysius K. Mok. 175-190 [doi]
- Leveraging User Interactions for In-Depth Testing of Web ApplicationsSean McAllister, Engin Kirda, Christopher Kruegel. 191-210 [doi]
- Model-Based Covert Timing Channels: Automated Modeling and EvasionSteven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia. 211-230 [doi]
- Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic ApproachSenthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe. 231-250 [doi]
- On the Limits of Payload-Oblivious Network Attack DetectionM. Patrick Collins, Michael K. Reiter. 251-270 [doi]
- Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network ModelingGaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon. 271-290 [doi]
- A Multi-Sensor Model to Improve Automated Attack DetectionMagnus Almgren, Ulf Lindqvist, Erland Jonsson. 291-310 [doi]
- Monitoring SIP Traffic Using Support Vector MachinesMohamed Nassar, Radu State, Olivier Festor. 311-330 [doi]
- The Effect of Clock Resolution on Keystroke DynamicsKevin S. Killourhy, Roy A. Maxion. 331-350 [doi]
- A Comparative Evaluation of Anomaly Detectors under Portscan AttacksAyesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam. 351-371 [doi]
- Advanced Network FingerprintingHumberto J. Abdelnur, Radu State, Olivier Festor. 372-389 [doi]
- On Evaluation of Response Cost for Intrusion Response SystemsNatalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong. 390-391 [doi]
- WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract)Nathalie Dagorn. 392-393 [doi]
- Evading Anomaly Detection through Variance Injection Attacks on PCABenjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar. 394-395 [doi]
- Anticipating Hidden Text Salting in EmailsChristina Lioma, Marie-Francine Moens, Juan Carlos Gomez, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan. 396-397 [doi]
- Improving Anomaly Detection Error Rate by Collective Trust ModelingMartin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek. 398-399 [doi]
- Database Intrusion Detection and ResponseAshish Kamra, Elisa Bertino. 400-401 [doi]
- An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract)Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim. 402-403 [doi]
- Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract)Junsup Lee, Sung Deok Cha. 404-405 [doi]
- Automating the Analysis of Honeypot Data (Extended Abstract)Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier. 406-407 [doi]
- Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and ResponsePaul Rubel, Partha Pratim Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber. 408-409 [doi]
- Monitoring the Execution of Third-Party Software on Mobile DevicesAndrew Brown, Mark Ryan. 410-411 [doi]
- Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract)Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina. 412-414 [doi]
- Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract)Wei Lu, Ali A. Ghorbani. 415-416 [doi]
- Anomalous Taint DetectionLorenzo Cavallaro, R. Sekar. 417-418 [doi]
- Deep Packet Inspection Using Message Passing NetworksDivya Jain, K. Vasanta Lakshmi, Priti Shankar. 419-420 [doi]
- System Call API Obfuscation (Extended Abstract)Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin. 421-422 [doi]