Abstract is missing.
- What Is the Impact of P2P Traffic on Anomaly Detection?Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam. 1-17 [doi]
- A Centralized Monitoring Infrastructure for Improving DNS SecurityManos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor. 18-37 [doi]
- Behavior-Based Worm Detectors ComparedShad Stafford, Jun Li. 38-57 [doi]
- Improving NFA-Based Signature Matching Using Ordered Binary Decision DiagramsLiu Yang, Rezwana Karim, Vinod Ganapathy, Randy Smith. 58-78 [doi]
- GrAVity: A Massively Parallel Antivirus EngineGiorgos Vasiliadis, Sotiris Ioannidis. 79-96 [doi]
- Automatic Discovery of Parasitic MalwareAbhinav Srivastava, Jonathon T. Giffin. 97-117 [doi]
- BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware DetectionBrian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo. 118-137 [doi]
- CANVuS: Context-Aware Network Vulnerability ScanningYunjing Xu, Michael Bailey, Eric Vander Weele, Farnam Jahanian. 138-157 [doi]
- HyperCheck: A Hardware-Assisted Integrity MonitorJiang Wang, Angelos Stavrou, Anup K. Ghosh. 158-177 [doi]
- Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel MemoryJunghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jiang. 178-197 [doi]
- Bait Your Hook: A Novel Detection Technique for KeyloggersStefano Ortolani, Cristiano Giuffrida, Bruno Crispo. 198-217 [doi]
- Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer SecurityCharles V. Wright, Christopher Connelly, Timothy Braje, Jesse C. Rabek, Lee M. Rossey, Robert K. Cunningham. 218-237 [doi]
- On Challenges in Evaluating Malware ClusteringPeng Li, Limin Liu, Debin Gao, Michael K. Reiter. 238-255 [doi]
- Why Did My Detector Do ::::That::::?! - Predicting Keystroke-Dynamics Error RatesKevin S. Killourhy, Roy A. Maxion. 256-276 [doi]
- NetStore: An Efficient Storage Infrastructure for Network Forensics and MonitoringPaul Giura, Nasir Memon. 277-296 [doi]
- Live and Trustworthy Forensic Analysis of Commodity Production SystemsLorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro. 297-316 [doi]
- Hybrid Analysis and Control of MalwareKevin A. Roundy, Barton P. Miller. 317-338 [doi]
- Anomaly Detection and Mitigation for Disaster Area NetworksJordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani. 339-359 [doi]
- Community Epidemic Detection Using Time-Correlated AnomaliesAdam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken. 360-381 [doi]
- A Data-Centric Approach to Insider Attack Detection in Database SystemsSunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Shambhu J. Upadhyaya. 382-401 [doi]
- Privilege States Based Access Control for Fine-Grained Intrusion ResponseAshish Kamra, Elisa Bertino. 402-421 [doi]
- Abusing Social Networks for Automated User ProfilingMarco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel. 422-441 [doi]
- An Analysis of Rogue AV CampaignsMarco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier. 442-463 [doi]
- Fast-Flux Bot Detection in Real TimeChing-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen. 464-483 [doi]
- A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request ForgeryLuyi Xing, Yuqing Zhang, Shenlong Chen. 484-485 [doi]
- A Distributed Honeynet at KFUPM: A Case StudyMohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed. 486-487 [doi]
- Aspect-Based Attack Detection in Large-Scale NetworksMartin Drasar, Jan Vykopal, Radek Krejcí, Pavel Celeda. 488-489 [doi]
- Detecting Network Anomalies in Backbone NetworksChristian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Teresa Pepe. 490-491 [doi]
- Detecting the Onset of Infection for Secure HostsKui Xu, Qiang Ma, Danfeng (Daphne) Yao. 492-493 [doi]
- Eliminating Human Specification in Static AnalysisYing Kong, Yuqing Zhang, Qixu Liu. 494-495 [doi]
- Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009Hosoi Takurou, Kanta Matsuura. 496-497 [doi]
- Inferring Protocol State Machine from Real-World TraceYipeng Wang, Zhibin Zhang, Li Guo. 498-499 [doi]
- MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADADina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel. 500-501 [doi]
- On Estimating Cyber Adversaries Capabilities: A Bayesian Model ApproachJianchun Jiang, Weifeng Chen, Liping Ding. 502-504 [doi]
- Security System for Encrypted Environments (S2E2)Robert Koch, Gabi Dreo Rodosek. 505-507 [doi]
- Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS EvidenceSerguei A. Mokhov, Joey Paquet, Mourad Debbabi. 508-509 [doi]
- Toward Specification-Based Intrusion Detection for Web ApplicationsSalman Niksefat, Mohammad Mehdi Ahaniha, Babak Sadeghiyan, Mehdi Shajari. 510-511 [doi]
- Toward Whole-System Dynamic Analysis for ARM-Based Mobile DevicesRyan Whelan, David Kaeli. 512-513 [doi]
- Using IRP for Malware DetectionFuYong Zhang, Deyu Qi, JingLin Hu. 514-515 [doi]