Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Submit Date
Title
Author
Help
FAQ
Contact
Publication Suppport for Authors
Policy
License Agreement
Information about Open Access
Language
Deutsch
English
Sign on to:
My Eldorado
Receive email
updates
Edit Profile
Eldorado - Repository of the TU Dortmund
Resources for and from Research, Teaching and Studying
Eldorado
Fach- und Universitätsübergreifendes
Fachgruppe SIDAR
Conferences
DIMVA
DIMVA 2004 : [43]
Recent Submissions
Foundations for Intrusion Prevention
See
DIMVA 2004 - Eröffnung und Abschluß
See
Workshop-Programm - Detection of Intrusions and Malware & Vulnerability Assessment
See
Call for Papers - Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2004)
See
Trau, SCHAU, wem? - V-IDS oder eine andere Sicht der Dinge
See
Ein Ansatz zur Intrusion Detection für Prozessautomatisierungssysteme
See
Hardened OS exploitation techniques
See
Ein Netzwerk von IDS-Sensoren für Angriffsstatistiken
See
UNIX und Linux basierte Kernel Rootkits
See
Risiken der Nichterkennung von Malware in komprimierter Form
See
Antipatterns in JDK-Security and Refactorings
See
Foundation for Intrusion Prevention
See
A Honeynet within the German Research Network — Experiences and Results
See
An Approach to Intrusion Detection for Process Control Systems
See
Trau, SCHAU, wem? - V-IDS oder eine andere Sicht der Dinge
See
Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines
See
Alert Verification - Determining the Success of Intrusion Attempts
See
Hardened OS exploitation
See
GI-Fachgruppe SIDAR - Fachgruppentreffen
See
Sensors for Detection of Misbehaving Nodes in MANETs
See
Browse
Collections in this community
Calls
[1]
Papers
[15]
Presentations
[21]
Program
[1]
White Papers
[5]
Discover
Author
4
Flegel, Ulrich
4
Meier, Michael
3
Kossakowski, Klaus-Peter
2
Abendroth, Jörg
2
Alderman, Ian D.
2
Bunten, Andreas
2
Burbeck, Kalle
2
Burschka, Stefan
2
Bussmann, Michael
2
Chyssler, Tobias
.
next >
Subject
17
Intrusion Detection
9
Vulnerability Assessment
8
Malware
4
Honeynet
3
intrusion detection
3
Vulnerabilities
2
Honeypot
2
MANETs
2
Rootkits
2
Verwundbarkeitsanalyse
.
next >
Date issued
1
2006
41
2004
1
2003