RAID A

40 papers

YearTitle / Authors
2010A Centralized Monitoring Infrastructure for Improving DNS Security.
Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor
2010A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery.
Luyi Xing, Yuqing Zhang, Shenlong Chen
2010A Data-Centric Approach to Insider Attack Detection in Database Systems.
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Shambhu J. Upadhyaya
2010A Distributed Honeynet at KFUPM: A Case Study.
Mohammed H. Sqalli, Raed Al-Shaikh, Ezzat Ahmed
2010Abusing Social Networks for Automated User Profiling.
Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel
2010An Analysis of Rogue AV Campaigns.
Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier
2010Anomaly Detection and Mitigation for Disaster Area Networks.
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani
2010Aspect-Based Attack Detection in Large-Scale Networks.
Martin Drasar, Jan Vykopal, Radek Krejcí, Pavel Celeda
2010Automatic Discovery of Parasitic Malware.
Abhinav Srivastava, Jonathon T. Giffin
2010Bait Your Hook: A Novel Detection Technique for Keyloggers.
Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo
2010Behavior-Based Worm Detectors Compared.
Shad Stafford, Jun Li
2010BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection.
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo
2010CANVuS: Context-Aware Network Vulnerability Scanning.
Yunjing Xu, Michael D. Bailey, Eric Vander Weele, Farnam Jahanian
2010Community Epidemic Detection Using Time-Correlated Anomalies.
Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken
2010Detecting Network Anomalies in Backbone Networks.
Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Teresa Pepe
2010Detecting the Onset of Infection for Secure Hosts.
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
2010Eliminating Human Specification in Static Analysis.
Ying Kong, Yuqing Zhang, Qixu Liu
2010Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009.
Hosoi Takurou, Kanta Matsuura
2010Fast-Flux Bot Detection in Real Time.
Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen
2010Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security.
Charles V. Wright, Christopher Connelly, Timothy M. Braje, Jesse C. Rabek, Lee M. Rossey, Robert K. Cunningham
2010GrAVity: A Massively Parallel Antivirus Engine.
Giorgos Vasiliadis, Sotiris Ioannidis
2010Hybrid Analysis and Control of Malware.
Kevin A. Roundy, Barton P. Miller
2010HyperCheck: A Hardware-Assisted Integrity Monitor.
Jiang Wang, Angelos Stavrou, Anup K. Ghosh
2010Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams.
Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Smith
2010Inferring Protocol State Machine from Real-World Trace.
Yipeng Wang, Zhibin Zhang, Li Guo
2010Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.
Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang
2010Live and Trustworthy Forensic Analysis of Commodity Production Systems.
Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro
2010MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA.
Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel
2010NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring.
Paul Giura, Nasir D. Memon
2010On Challenges in Evaluating Malware Clustering.
Peng Li, Limin Liu, Debin Gao, Michael K. Reiter
2010On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach.
Jianchun Jiang, Weifeng Chen, Liping Ding
2010Privilege States Based Access Control for Fine-Grained Intrusion Response.
Ashish Kamra, Elisa Bertino
2010Recent Advances in Intrusion Detection, 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings
Somesh Jha, Robin Sommer, Christian Kreibich
2010Security System for Encrypted Environments (S2E2).
Robert Koch, Gabi Dreo Rodosek
2010Toward Specification-Based Intrusion Detection for Web Applications.
Salman Niksefat, Mohammad Mehdi Ahaniha, Babak Sadeghiyan, Mehdi Shajari
2010Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices.
Ryan Whelan, David R. Kaeli
2010Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence.
Serguei A. Mokhov, Joey Paquet, Mourad Debbabi
2010Using IRP for Malware Detection.
FuYong Zhang, Deyu Qi, Jinglin Hu
2010What Is the Impact of P2P Traffic on Anomaly Detection?
Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam
2010Why Did My Detector Do
Kevin S. Killourhy, Roy A. Maxion