Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 20
Issue Date | Title | Author(s) |
2009-07-29T15:47:26Z | Cipher 5 | Pimenidis, Lexi |
2009-07-29T15:47:22Z | Selecting and Improving System Call Models for Anomaly Detection | Frossi, Alessandro; Maggi, Federico; Rizzo, Gian L.; Zanero, Stefano |
2009-07-29T15:47:19Z | Learning SQL for Database Intrusion Detection using Context-sensitive Modelling | Apel, Martin; Bockermann, Christian; Meier, Michael |
2009-07-29T15:47:17Z | Browser SSL-Fingerprinting | Bockermann, Christian |
2009-07-29T15:47:14Z | Bypassing Kernel-Integrity Protection Mechanisms | Freiling, Felix; Holz, Thorsten; Hund, Ralf |
2009-07-29T15:47:12Z | Tracking Intelligence Project | Dell'Aera, Angelo |
2009-07-29T15:47:09Z | Visualization of Malware Behavior | Trinius, Philipp |
2009-07-29T15:47:07Z | Are botnets used to run phishing over the phone? | Maggi, Federico |
2009-07-29T15:47:04Z | A Service Dependency Modeling Framework for Policy-based Response Enforcement | Cuppens-Boulahia, Nora; Cuppens, Frédéric; Debar, Hervé; Kheir, Nizar; Viinikka, Jouni |
2009-07-29T15:47:02Z | Browser Fingerprinting from Coarse Traffic Summaries | Huang, Xin; Monrose, Fabian; Reiter, Michael K.; Yen, Ting-Fang |
2009-07-29T15:46:59Z | Using Contextual Information for IDS Alarm Classification | Esfandiari, Babak; Gagnon, Francois; Massicotte, Frédéric |
2009-07-29T15:46:57Z | On the Effectiveness of Software Diversity | Deng, Robert H.; Gao, Debin; Han, Jin |
2009-07-29T15:46:54Z | Polymorphing Software by Randomizing Data Structure Layout | Lin, Zhiqiang; Riley, Ryan; Xu, Dongyan |
2009-07-29T15:46:52Z | How to Steal a Botnet and What Can Happen When You Do | Kemmerer, Richard |
2009-07-29T15:46:49Z | Defending Browsers against Drive-by Downloads | Egele, Manuel; Kirda, Engin; Kruegel, Christopher; Wurzinger, Peter |
2009-07-29T15:46:47Z | Yataglass | Kono, Kenji; Shimamura, Makato |
2009-07-29T15:46:45Z | Shepherding Loadable Kernel Module through On-demand Emulation | Beyah, Raheem; Copeland, John; Xuan, Chaoting |
2009-07-29T15:46:42Z | Towards Proactive SPAM Filtering | Göbel, Jan; Holz, Thorsten; Trinius, Philipp |
2009-07-29T15:46:40Z | A Case Study on Asprox Infection Dynamics | Gupta, Minaxi; Myers, Steven; Shin, Youngsang |
2009-07-29T15:46:36Z | Program, Selection and Statistics | Flegel, Ulrich |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 20