Abstract is missing.
- Automatic Extraction of Accurate Application-Specific Sandboxing PolicyLap-Chung Lam, Tzi-cker Chiueh. 1-20 [doi]
- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible PathsHaizhi Xu, Wenliang Du, Steve J. Chapin. 21-38 [doi]
- HoneyStat: Local Worm Detection Using HoneypotsDavid Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen. 39-58 [doi]
- Fast Detection of Scanning Worm InfectionsStuart E. Schechter, Jaeyeon Jung, Arthur W. Berger. 59-81 [doi]
- Detecting Unknown Massive Mailing Viruses Using Proactive MethodsRuiqi Hu, Aloysius K. Mok. 82-101 [doi]
- Using Adaptive Alert Classification to Reduce False Positives in Intrusion DetectionTadeusz Pietraszek. 102-124 [doi]
- Attack Analysis and Detection for Ad Hoc Routing ProtocolsYi-an Huang, Wenke Lee. 125-145 [doi]
- On the Design and Use of Internet Sinks for Network Abuse MonitoringVinod Yegneswaran, Paul Barford, David Plonka. 146-165 [doi]
- Monitoring IDS Background Noise Using EWMA Control Charts and Alert InformationJouni Viinikka, Hervé Debar. 166-187 [doi]
- Symantec Deception Server Experience with a Commercial Deception SystemBrian Hernacki, Jeremy Bennett, Thomas Lofgren. 188-202 [doi]
- Anomalous Payload-Based Network Intrusion DetectionKe Wang, Salvatore J. Stolfo. 203-222 [doi]
- Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence MatrixMizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato. 223-237 [doi]
- Seurat: A Pointillist Approach to Anomaly DetectionYinglian Xie, Hyang-Ah Kim, David R. O Hallaron, Michael K. Reiter, Hui Zhang. 238-257 [doi]
- Detection of Interactive Stepping Stones: Algorithms and Confidence BoundsAvrim Blum, Dawn Xiaodong Song, Shobha Venkataraman. 258-277 [doi]
- Formal Reasoning About Intrusion Detection SystemsTao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt. 278-295 [doi]
- RheoStat: Real-Time Risk ManagementAshish Gehani, Gershon Kedem. 296-314 [doi]