Abstract is missing.
- A Framework for the Application of Association Rule Mining in Large Intrusion Detection InfrastructuresJames J. Treinen, Ramakrishna Thurimella. 1-18 [doi]
- Behavioral Distance Measurement Using Hidden Markov ModelsDebin Gao, Michael K. Reiter, Dawn Xiaodong Song. 19-40 [doi]
- Automated Discovery of Mimicry AttacksJonathon T. Giffin, Somesh Jha, Barton P. Miller. 41-60 [doi]
- Allergy Attack Against Automatic Signature GenerationSimon P. Chung, Aloysius K. Mok. 61-80 [doi]
- Paragraph: Thwarting Signature Learning by Training MaliciouslyJames Newsome, Brad Karp, Dawn Xiaodong Song. 81-105 [doi]
- Anomaly Detector Performance Evaluation Using a Parameterized EnvironmentJeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion. 106-126 [doi]
- Ranking Attack GraphsVaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund M. Clarke, Jeannette M. Wing. 127-144 [doi]
- Using Hidden Markov Models to Evaluate the Risks of IntrusionsAndré Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer. 145-164 [doi]
- The Nepenthes Platform: An Efficient Approach to Collect MalwarePaul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling. 165-184 [doi]
- Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based HoneypotsCorrado Leita, Marc Dacier, Frédéric Massicotte. 185-205 [doi]
- Fast and Evasive Attacks: Highlighting the Challenges AheadMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis. 206-225 [doi]
- Anagram: A Content Anomaly Detector Resistant to Mimicry AttackKe Wang, Janak J. Parekh, Salvatore J. Stolfo. 226-248 [doi]
- DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANETChinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt. 249-271 [doi]
- Enhancing Network Intrusion Detection with Integrated Sampling and FilteringJosé M. González, Vern Paxson. 272-289 [doi]
- WIND: Workload-Aware INtrusion DetectionSushant Sinha, Farnam Jahanian, Jignesh M. Patel. 290-310 [doi]
- SafeCard: A Gigabit IPS on the Network CardWillem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomas Hruby, Li Xu, Herbert Bos. 311-330 [doi]