Abstract is missing.
- Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection SystemsDamiano Bolzoni, Sandro Etalle, Pieter H. Hartel. 1-20 [doi]
- Protecting a Moving Target: Addressing Web Application Concept DriftFederico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna. 21-40 [doi]
- Adaptive Anomaly Detection via Self-calibration and Dynamic UpdatingGabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo. 41-60 [doi]
- Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection SystemsMartin Rehák, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin Grill, Jan Stiborek, Karel Bartos, Thomas Engel. 61-80 [doi]
- Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and LanguageGrégoire Jacob, Hervé Debar, Eric Filiol. 81-100 [doi]
- Automatic Generation of String Signatures for Malware DetectionKent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh. 101-120 [doi]
- PE-Miner: Mining Structural Information to Detect Malicious Executables in RealtimeM. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq. 121-141 [doi]
- Automatically Adapting a Trained Anomaly Detector to Software PatchesPeng Li, Debin Gao, Michael K. Reiter. 142-160 [doi]
- Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided ExplorationJuan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song. 161-181 [doi]
- Automated Behavioral FingerprintingJérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor. 182-201 [doi]
- SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly DetectionGuanhua Yan, Stephan Eidenbenz, Emanuele Galli. 202-223 [doi]
- Keystroke-Based User Identification on Smart PhonesSaira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq. 224-243 [doi]
- VirusMeter: Preventing Your Cellphone from SpiesLei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen. 244-264 [doi]
- Regular Expression Matching on Graphics Hardware for Intrusion DetectionGiorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis. 265-283 [doi]
- Multi-byte Regular Expression Matching with SpeculationDaniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha. 284-303 [doi]
- Toward Revealing Kernel Malware Behavior in Virtual Execution EnvironmentsChaoting Xuan, John A. Copeland, Raheem A. Beyah. 304-325 [doi]
- Exploiting Temporal Persistence to Detect Covert Botnet ChannelsFrédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki. 326-345 [doi]
- An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly DetectionYang Li, Li Guo, Binxing Fang, Xiang-Tao Liu, Lin Qi. 346-347 [doi]
- Automatic Software Instrumentation for the Detection of Non-control-data AttacksJonathan-Christofer Demay, Eric Totel, Frédéric Tronel. 348-349 [doi]
- BLADE: Slashing the Invisible Channel of Drive-by Download MalwareLong Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee. 350-352 [doi]
- Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security PolicyLaurent George, Valérie Viet Triem Tong, Ludovic Mé. 355-356 [doi]
- Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based ApproachAsaf Shabtai, Uri Kanonov, Yuval Elovici. 357-358 [doi]
- Autonomic Intrusion Detection SystemWei Wang 0012, Thomas Guyet, Svein J. Knapskog. 359-361 [doi]
- ALICE@home: Distributed Framework for Detecting Malicious SitesIkpeme Erete, Vinod Yegneswaran, Phillip A. Porras. 362-364 [doi]
- Packet Space Analysis of Intrusion Detection SignaturesFrédéric Massicotte. 365-366 [doi]
- Traffic Behaviour Characterization Using NetMateAnnie De Montigny-Leboeuf, Mathieu Couture, Frédéric Massicotte. 367-368 [doi]
- On the Inefficient Use of Entropy for Anomaly DetectionMobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam. 369-370 [doi]
- Browser-Based Intrusion Prevention SystemIkpeme Erete. 371-373 [doi]
- Using Formal Grammar and Genetic Operators to Evolve MalwareSadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq. 374-375 [doi]
- Method for Detecting Unknown Malicious ExecutablesBoris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel. 376-377 [doi]
- Brave New World: Pervasive Insecurity of Embedded Network DevicesAng Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo. 378-380 [doi]
- DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live NetworksDaisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao. 381-382 [doi]