Abstract is missing.
- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C ProgramsEbrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop. 1-16 [doi]
- Using Static Program Analysis to Aid Intrusion DetectionManuel Egele, Martin Szydlowski, Engin Kirda, Christopher Krügel. 17-36 [doi]
- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence MatrixLiangwen Chen, Masayoshi Aritsugi. 37-53 [doi]
- Network-Level Polymorphic Shellcode Detection Using EmulationMichalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos. 54-73 [doi]
- Detecting Unknown Network Attacks Using Language ModelsKonrad Rieck, Pavel Laskov. 74-90 [doi]
- Using Labeling to Prevent Cross-Service Attacks Against Smart PhonesCollin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee. 91-108 [doi]
- Using Contextual Security Policies for Threat ResponseHervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens. 109-128 [doi]
- Detecting Self-mutating Malware Using Control-Flow Graph MatchingDanilo Bruschi, Lorenzo Martignoni, Mattia Monga. 129-143 [doi]
- Digital Forensic Reconstruction and the Virtual Security Testbed ViSeAndré Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer. 144-163 [doi]
- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETsMarko Jahnke, Jens Tölle, Sascha Lettgen, Michael Bussmann, Uwe Weddige. 164-180 [doi]
- A Fast Worm Scan Detection Tool for VPN Congestion AvoidanceArno Wagner, Thomas Dübendorfer, Roman Hiestand, Christoph Göldi, Bernhard Plattner. 181-194 [doi]