Abstract is missing.
- Exploiting Execution Context for the Detection of Anomalous System CallsDarren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer. 1-20 [doi]
- Understanding Precision in Host Based Intrusion DetectionMonirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee. 21-41 [doi]
- Comparing Anomaly Detection Techniques for HTTPKenneth L. Ingham, Hajime Inoue. 42-62 [doi]
- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web ApplicationsMarco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna. 63-86 [doi]
- Emulation-Based Detection of Non-self-contained Polymorphic ShellcodeMichalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos. 87-106 [doi]
- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity HardwareMatthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, Brian Tierney. 107-126 [doi]
- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc NetworksShiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matthew Bishop. 127-145 [doi]
- elicit: A System for Detecting Insiders Who Violate Need-to-KnowMarcus A. Maloof, Gregory D. Stephens. 146-166 [doi]
- On the Use of Different Statistical Tests for Alert Correlation - Short PaperFederico Maggi, Stefano Zanero. 167-177 [doi]
- Automated Classification and Analysis of Internet MalwareMichael Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario. 178-197 [doi]
- Out-of-the-Box Monitoring of VM-Based High-Interaction HoneypotsXuxian Jiang, Xinyuan Wang. 198-218 [doi]
- A Forced Sampled Execution Approach to Kernel Rootkit IdentificationJeffrey Wilhelm, Tzi-cker Chiueh. 219-235 [doi]
- Advanced Allergy Attacks: Does a Corpus Really Help?Simon P. Chung, Aloysius K. Mok. 236-255 [doi]
- Alert Verification Evasion Through Server Response ForgingAdam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers. 256-275 [doi]
- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol GraphsM. Patrick Collins, Michael K. Reiter. 276-295 [doi]
- SpyShield: Preserving Privacy from Spy Add-OnsZhuowei Li, Xiaofeng Wang, Jong Youl Choi. 296-316 [doi]
- Vortex: Enabling Cooperative Selective Wormholing for Network Security SystemsJohn R. Lange, Peter A. Dinda, Fabián E. Bustamante. 317-336 [doi]