| 2005 | A Learning-Based Approach to the Detection of SQL Attacks. Fredrik Valeur, Darren Mutz, Giovanni Vigna |
| 2005 | A Pointillist Approach for Comparing Honeypots. Fabien Pouget, Thorsten Holz |
| 2005 | A Prevention Model for Algorithmic Complexity Attacks. Suraiya Khan, Issa Traoré |
| 2005 | Analyzing Memory Accesses in Obfuscated x86 Executables. Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia |
| 2005 | Automatic Detection of Attacks on Cryptographic Protocols: A Case Study. Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano |
| 2005 | Detecting Malicious Code by Model Checking. Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith |
| 2005 | Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings Klaus Julisch, Christopher Krügel |
| 2005 | Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. Holger Dreger, Christian Kreibich, Vern Paxson, Robin Sommer |
| 2005 | Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong |
| 2005 | Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone. Thomas Dübendorfer, Arno Wagner, Theus Hossmann, Bernhard Plattner |
| 2005 | Hybrid Engine for Polymorphic Shellcode Detection. Udo Payer, Peter Teufl, Mario Lamberger |
| 2005 | Improving the Efficiency of Misuse Detection. Michael Meier, Sebastian Schmerl, Hartmut König |
| 2005 | METAL - A Tool for Extracting Attack Manifestations. Ulf Larson, Emilie Lundin Barse, Erland Jonsson |
| 2005 | Masquerade Detection via Customized Grammars. Mario Latendresse |
| 2005 | TCPtransform: Property-Oriented TCP Traffic Transformation. Seung-Sun Hong, Fiona Wong, Shyhtsun Felix Wu, Bjorn Lilja, Tony Y. Yohansson, Henric Johnson, Ame Nelsson |