| 2008 | A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam |
| 2008 | A First Step towards Live Botmaster Traceback. Daniel Ramsbrock, Xinyuan Wang, Xuxian Jiang |
| 2008 | A Layered Architecture for Detecting Malicious Behaviors. Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell |
| 2008 | A Multi-Sensor Model to Improve Automated Attack Detection. Magnus Almgren, Ulf Lindqvist, Erland Jonsson |
| 2008 | A Study of the Packer Problem and Its Solutions. Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh |
| 2008 | Advanced Network Fingerprinting. Humberto J. Abdelnur, Radu State, Olivier Festor |
| 2008 | An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim |
| 2008 | Anomalous Taint Detection. Lorenzo Cavallaro, R. Sekar |
| 2008 | Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. Paul Rubel, Partha P. Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber |
| 2008 | Anticipating Hidden Text Salting in Emails. Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan |
| 2008 | Automating the Analysis of Honeypot Data (Extended Abstract). Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier |
| 2008 | Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). Wei Lu, Ali A. Ghorbani |
| 2008 | Countering Persistent Kernel Rootkits through Systematic Hook Discovery. Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang |
| 2008 | Database Intrusion Detection and Response. Ashish Kamra, Elisa Bertino |
| 2008 | Deep Packet Inspection Using Message Passing Networks. Divya Jain, K. Vasanta Lakshmi, Priti Shankar |
| 2008 | Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling. Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon |
| 2008 | Evading Anomaly Detection through Variance Injection Attacks on PCA. Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-Hon Lau, Nina Taft, J. Doug Tygar |
| 2008 | Gnort: High Performance Network Intrusion Detection Using Graphics Processors. Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis |
| 2008 | Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
| 2008 | High-Speed Matching of Vulnerability Signatures. Nabil Schear, David R. Albrecht, Nikita Borisov |
| 2008 | Improving Anomaly Detection Error Rate by Collective Trust Modeling. Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek |
| 2008 | Leveraging User Interactions for In-Depth Testing of Web Applications. Sean McAllister, Engin Kirda, Christopher Kruegel |
| 2008 | Model-Based Covert Timing Channels: Automated Modeling and Evasion. Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia |
| 2008 | Monitoring SIP Traffic Using Support Vector Machines. Mohamed Nassar, Radu State, Olivier Festor |
| 2008 | Monitoring the Execution of Third-Party Software on Mobile Devices. Andrew Brown, Mark Ryan |
| 2008 | On Evaluation of Response Cost for Intrusion Response Systems. Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong |
| 2008 | On the Limits of Payload-Oblivious Network Attack Detection. M. Patrick Collins, Michael K. Reiter |
| 2008 | Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe |
| 2008 | Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). Junsup Lee, Sung Deok Cha |
| 2008 | Predicting the Resource Consumption of Network Intrusion Detection Systems. Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer |
| 2008 | Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings Richard Lippmann, Engin Kirda, Ari Trachtenberg |
| 2008 | Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract). Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina |
| 2008 | Swarm Attacks against Network-Level Emulation/Analysis. Simon P. Chung, Aloysius K. Mok |
| 2008 | System Call API Obfuscation (Extended Abstract). Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin |
| 2008 | Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. Abhinav Srivastava, Jonathon T. Giffin |
| 2008 | The Effect of Clock Resolution on Keystroke Dynamics. Kevin S. Killourhy, Roy A. Maxion |
| 2008 | WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract). Nathalie Dagorn |