Abstract is missing.
- A connection pattern-based approach to detect network traffic anomalies in critical infrastructuresBéla Genge, Dorin Adrian Rusu, Piroska Haller. 1 [doi]
- Improving Mac OS X security through gray box fuzzing techniqueStefano Bianchi Mazzone, Mattia Pagnozzi, Aristide Fattori, Alessandro Reina, Andrea Lanzi, Danilo Bruschi. 2 [doi]
- On measuring the impact of DDoS botnetsArne Welzel, Christian Rossow, Herbert Bos. 3 [doi]
- A practical approach for generic bootkit detection and preventionBernhard Grill, Christian Platzer, Jürgen Eckel. 4 [doi]
- Rage against the virtual machine: hindering dynamic analysis of Android malwareThanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis. 5 [doi]
- The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphonesDimitrios Damopoulos, Georgios Kambourakis, Georgios Portokalidis. 6 [doi]