| 2006 | A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures. James J. Treinen, Ramakrishna Thurimella |
| 2006 | Allergy Attack Against Automatic Signature Generation. Simon P. Chung, Aloysius K. Mok |
| 2006 | Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. Ke Wang, Janak J. Parekh, Salvatore J. Stolfo |
| 2006 | Anomaly Detector Performance Evaluation Using a Parameterized Environment. Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion |
| 2006 | Automated Discovery of Mimicry Attacks. Jonathon T. Giffin, Somesh Jha, Barton P. Miller |
| 2006 | Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots. Corrado Leita, Marc Dacier, Frédéric Massicotte |
| 2006 | Behavioral Distance Measurement Using Hidden Markov Models. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song |
| 2006 | DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt |
| 2006 | Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. José M. González, Vern Paxson |
| 2006 | Fast and Evasive Attacks: Highlighting the Challenges Ahead. Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
| 2006 | Paragraph: Thwarting Signature Learning by Training Maliciously. James Newsome, Brad Karp, Dawn Xiaodong Song |
| 2006 | Ranking Attack Graphs. Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund M. Clarke, Jeannette M. Wing |
| 2006 | Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings Diego Zamboni, Christopher Krügel |
| 2006 | SafeCard: A Gigabit IPS on the Network Card. Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomás Hrubý, Li Xu, Herbert Bos |
| 2006 | The Nepenthes Platform: An Efficient Approach to Collect Malware. Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling |
| 2006 | Using Hidden Markov Models to Evaluate the Risks of Intrusions. André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer |
| 2006 | WIND: Workload-Aware INtrusion Detection. Sushant Sinha, Farnam Jahanian, Jignesh M. Patel |