Collection's Items (Sorted by Submit Date in Descending order): 1 to 15 of 15
Issue Date | Title | Author(s) |
2009-07-29T15:16:37Z | Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems | Juan, Leo; Kreibich, Christian; Lin, Chih-Hung; Paxson, Vern |
2009-07-29T15:16:35Z | The quest for multi-headed worms | Dacier, Marc; En-Najjary, Taoufik; Pham, Van-Hau; Urvoy-Keller, Guillaume |
2009-07-29T15:16:33Z | The Contact Surface | Gates, Carrie; McHugh, John |
2009-07-29T15:16:31Z | Traffic Aggregation for Malware Detection | Reiter, Michael; Yen, Ting-Fang |
2009-07-29T15:16:28Z | FluXOR | Bruschi, Danilo; Martignoni, Lorenzo; Paleari, Roberto; Passerini, Emanuele |
2009-07-29T15:16:26Z | Expanding Malware Defense by Securing Software Installations | Liang, Zhenkai; Sekar, R.; Sun, Weiqing; Venkatakrishnan, V. N. |
2009-07-29T15:16:24Z | On the Limits of Information Flow Techniques for Malware Analysis and Containment | Cavallaro, Lorenzo; Saxena, Prateek; Sekar, R. |
2009-07-29T15:16:21Z | On Race Vulnerabilities in Web Applications | Bruschi, Danilo; Marrone, Davide; Monga, Mattia; Paleari, Roberto |
2009-07-29T15:16:19Z | XSS-Guard | Bisht, Prithvi; Venkatakrishnan, V. N. |
2009-07-29T15:16:17Z | Data Space Randomization (DSR) | Bhatkar, Sandeep; Sekar, R. |
2009-07-29T15:16:14Z | Learning and Classification of Malware Behavior | Düssel, Patrick; Holz, Thorsten; Laskov, Pavel; Rieck, Konrad; Willems, Carsten |
2009-07-29T15:16:12Z | Embedded Malware Detection using Markov n-grams | Farooq, Muddassar; Khayam, Syed Ali; Shafiq, M. Zubair |
2009-07-29T15:16:09Z | Dynamic Binary Instrumentation-based Framework for Malware Defense | Aaraj, Najwa; Jha, Niraj K.; Raghunathan, Anand |
2009-07-29T15:16:07Z | Keynote - The Future of Network Security Monitoring | Bejtlich, Richard |
2009-07-29T15:16:03Z | Introduction | Debar, Hervé |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 15 of 15