Abstract is missing.
- Analyzing Memory Accesses in Obfuscated x86 ExecutablesMichael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia. 1-18 [doi]
- Hybrid Engine for Polymorphic Shellcode DetectionUdo Payer, Peter Teufl, Mario Lamberger. 19-31 [doi]
- Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown VulnerabilitiesJedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong. 32-50 [doi]
- A Pointillist Approach for Comparing HoneypotsFabien Pouget, Thorsten Holz. 51-68 [doi]
- Automatic Detection of Attacks on Cryptographic Protocols: A Case StudyIvan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano. 69-84 [doi]
- METAL - A Tool for Extracting Attack ManifestationsUlf Larson, Emilie Lundin Barse, Erland Jonsson. 85-102 [doi]
- Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet BackboneThomas Dübendorfer, Arno Wagner, Theus Hossmann, Bernhard Plattner. 103-122 [doi]
- A Learning-Based Approach to the Detection of SQL AttacksFredrik Valeur, Darren Mutz, Giovanni Vigna. 123-140 [doi]
- Masquerade Detection via Customized GrammarsMario Latendresse. 141-159 [doi]
- A Prevention Model for Algorithmic Complexity AttacksSuraiya Khan, Issa Traoré. 160-173 [doi]
- Detecting Malicious Code by Model CheckingJohannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith. 174-187 [doi]
- Improving the Efficiency of Misuse DetectionMichael Meier, Sebastian Schmerl, Hartmut König. 188-205 [doi]
- Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based ContextHolger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer. 206-221 [doi]
- TCPtransform: Property-Oriented TCP Traffic TransformationSeung-Sun Hong, Fiona Wong, Shyhtsun Felix Wu, Bjorn Lilja, Tony Y. Yohansson, Henric Johnson, Ame Nelsson. 222-240 [doi]