dblp: RAID 2009 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


12. RAID 2009: Saint-Malo, France

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Engin Kirda, Somesh Jha, Davide Balzarotti:
Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Lecture Notes in Computer Science 5758, Springer 2009, ISBN 978-3-642-04341-3
Recent Advances in Intrusion Detection Anomaly and Specification-Based Approaches

Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel
:
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. 1-20

Federico Maggi
, William K. Robertson
, Christopher Krügel, Giovanni Vigna:
Protecting a Moving Target: Addressing Web Application Concept Drift. 21-40

Gabriela F. Cretu-Ciocarlie, Angelos Stavrou
, Michael E. Locasto, Salvatore J. Stolfo:
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. 41-60

Martin Rehák, Eugen Staab
, Volker Fusenig, Michal Pechoucek
, Martin Grill, Jan Stiborek
, Karel Bartos, Thomas Engel:
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. 61-80
Malware Detection and Prevention (I)

Grégoire Jacob, Hervé Debar
, Eric Filiol
:
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. 81-100

Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh:
Automatic Generation of String Signatures for Malware Detection. 101-120

M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza
, Muddassar Farooq:
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. 121-141
Network and Host Intrusion Detection and Prevention
Intrusion Detection for Mobile Devices

Guanhua Yan, Stephan J. Eidenbenz
, Emanuele Galli:
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. 202-223

Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq:
Keystroke-Based User Identification on Smart Phones. 224-243

Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen:
VirusMeter: Preventing Your Cellphone from Spies. 244-264
High-Performance Intrusion Detection

Giorgos Vasiliadis
, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis:
Regular Expression Matching on Graphics Hardware for Intrusion Detection. 265-283

Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha:
Multi-byte Regular Expression Matching with Speculation. 284-303
Malware Detection and Prevention (II)

Chaoting Xuan, John A. Copeland, Raheem A. Beyah
:
Toward Revealing Kernel Malware Behavior in Virtual Execution Environments. 304-325

Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki:
Exploiting Temporal Persistence to Detect Covert Botnet Channels. 326-345
Posters

Yang Li, Li Guo, Binxing Fang, Xiangtao Liu, Lin Qi:
An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. 346-347

Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel
:
Automatic Software Instrumentation for the Detection of Non-control-data Attacks. 348-349

Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:
BLADE: Slashing the Invisible Channel of Drive-by Download Malware. 350-352

Milosz Marian Hulboj, Ryszard Erazm Jurga:
CERN Investigation of Network Behaviour and Anomaly Detection. 353-354

Laurent George, Valérie Viet Triem Tong, Ludovic Mé:
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. 355-356

Asaf Shabtai, Uri Kanonov, Yuval Elovici:
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. 357-358

Wei Wang, Thomas Guyet
, Svein J. Knapskog:
Autonomic Intrusion Detection System. 359-361

Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras:
ALICE@home: Distributed Framework for Detecting Malicious Sites. 362-364

Frédéric Massicotte:
Packet Space Analysis of Intrusion Detection Signatures. 365-366

Annie De Montigny-Leboeuf, Mathieu Couture, Frédéric Massicotte:
Traffic Behaviour Characterization Using NetMate. 367-368

Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam:
On the Inefficient Use of Entropy for Anomaly Detection. 369-370

Ikpeme Erete:
Browser-Based Intrusion Prevention System. 371-373

Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq:
Using Formal Grammar and Genetic Operators to Evolve Malware. 374-375

Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:
Method for Detecting Unknown Malicious Executables. 376-377

Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo:
Brave New World: Pervasive Insecurity of Embedded Network Devices. 378-380

Daisuke Inoue, Mio Suzuki, Masashi Eto
, Katsunari Yoshioka
, Koji Nakao:
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. 381-382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






