| 2009 | ALICE@home: Distributed Framework for Detecting Malicious Sites. Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras |
| 2009 | Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo |
| 2009 | An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. Yang Li, Li Guo, Binxing Fang, Xiangtao Liu, Lin Qi |
| 2009 | Automated Behavioral Fingerprinting. Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor |
| 2009 | Automatic Generation of String Signatures for Malware Detection. Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh |
| 2009 | Automatic Software Instrumentation for the Detection of Non-control-data Attacks. Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel |
| 2009 | Automatically Adapting a Trained Anomaly Detector to Software Patches. Peng Li, Debin Gao, Michael K. Reiter |
| 2009 | Autonomic Intrusion Detection System. Wei Wang, Thomas Guyet, Svein J. Knapskog |
| 2009 | BLADE: Slashing the Invisible Channel of Drive-by Download Malware. Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee |
| 2009 | Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. Laurent George, Valérie Viet Triem Tong, Ludovic Mé |
| 2009 | Brave New World: Pervasive Insecurity of Embedded Network Devices. Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo |
| 2009 | Browser-Based Intrusion Prevention System. Ikpeme Erete |
| 2009 | CERN Investigation of Network Behaviour and Anomaly Detection. Milosz Marian Hulboj, Ryszard Erazm Jurga |
| 2009 | DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao |
| 2009 | Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. Asaf Shabtai, Uri Kanonov, Yuval Elovici |
| 2009 | Exploiting Temporal Persistence to Detect Covert Botnet Channels. Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki |
| 2009 | Keystroke-Based User Identification on Smart Phones. Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq |
| 2009 | Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. Grégoire Jacob, Hervé Debar, Eric Filiol |
| 2009 | Method for Detecting Unknown Malicious Executables. Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel |
| 2009 | Multi-byte Regular Expression Matching with Speculation. Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha |
| 2009 | On the Inefficient Use of Entropy for Anomaly Detection. Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam |
| 2009 | PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq |
| 2009 | Packet Space Analysis of Intrusion Detection Signatures. Frédéric Massicotte |
| 2009 | Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel |
| 2009 | Protecting a Moving Target: Addressing Web Application Concept Drift. Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna |
| 2009 | Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings Engin Kirda, Somesh Jha, Davide Balzarotti |
| 2009 | Regular Expression Matching on Graphics Hardware for Intrusion Detection. Giorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis |
| 2009 | Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. Martin Rehák, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin Grill, Jan Stiborek, Karel Bartos, Thomas Engel |
| 2009 | SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. Guanhua Yan, Stephan J. Eidenbenz, Emanuele Galli |
| 2009 | Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
| 2009 | Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song |
| 2009 | Traffic Behaviour Characterization Using NetMate. Annie De Montigny-Leboeuf, Mathieu Couture, Frédéric Massicotte |
| 2009 | Using Formal Grammar and Genetic Operators to Evolve Malware. Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
| 2009 | VirusMeter: Preventing Your Cellphone from Spies. Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen |