RAID A

34 papers

YearTitle / Authors
2009ALICE@home: Distributed Framework for Detecting Malicious Sites.
Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras
2009Adaptive Anomaly Detection via Self-calibration and Dynamic Updating.
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo
2009An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection.
Yang Li, Li Guo, Binxing Fang, Xiangtao Liu, Lin Qi
2009Automated Behavioral Fingerprinting.
Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor
2009Automatic Generation of String Signatures for Malware Detection.
Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh
2009Automatic Software Instrumentation for the Detection of Non-control-data Attacks.
Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel
2009Automatically Adapting a Trained Anomaly Detector to Software Patches.
Peng Li, Debin Gao, Michael K. Reiter
2009Autonomic Intrusion Detection System.
Wei Wang, Thomas Guyet, Svein J. Knapskog
2009BLADE: Slashing the Invisible Channel of Drive-by Download Malware.
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee
2009Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy.
Laurent George, Valérie Viet Triem Tong, Ludovic Mé
2009Brave New World: Pervasive Insecurity of Embedded Network Devices.
Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo
2009Browser-Based Intrusion Prevention System.
Ikpeme Erete
2009CERN Investigation of Network Behaviour and Anomaly Detection.
Milosz Marian Hulboj, Ryszard Erazm Jurga
2009DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao
2009Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach.
Asaf Shabtai, Uri Kanonov, Yuval Elovici
2009Exploiting Temporal Persistence to Detect Covert Botnet Channels.
Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki
2009Keystroke-Based User Identification on Smart Phones.
Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq
2009Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language.
Grégoire Jacob, Hervé Debar, Eric Filiol
2009Method for Detecting Unknown Malicious Executables.
Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel
2009Multi-byte Regular Expression Matching with Speculation.
Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha
2009On the Inefficient Use of Entropy for Anomaly Detection.
Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam
2009PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime.
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq
2009Packet Space Analysis of Intrusion Detection Signatures.
Frédéric Massicotte
2009Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems.
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel
2009Protecting a Moving Target: Addressing Web Application Concept Drift.
Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna
2009Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings
Engin Kirda, Somesh Jha, Davide Balzarotti
2009Regular Expression Matching on Graphics Hardware for Intrusion Detection.
Giorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis
2009Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems.
Martin Rehák, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin Grill, Jan Stiborek, Karel Bartos, Thomas Engel
2009SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection.
Guanhua Yan, Stephan J. Eidenbenz, Emanuele Galli
2009Toward Revealing Kernel Malware Behavior in Virtual Execution Environments.
Chaoting Xuan, John A. Copeland, Raheem A. Beyah
2009Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song
2009Traffic Behaviour Characterization Using NetMate.
Annie De Montigny-Leboeuf, Mathieu Couture, Frédéric Massicotte
2009Using Formal Grammar and Genetic Operators to Evolve Malware.
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq
2009VirusMeter: Preventing Your Cellphone from Spies.
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen