Presentations : [20]

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 20
Issue DateTitleAuthor(s)
2009-07-29T15:47:26ZCipher 5Pimenidis, Lexi
2009-07-29T15:47:22ZSelecting and Improving System Call Models for Anomaly DetectionFrossi, Alessandro; Maggi, Federico; Rizzo, Gian L.; Zanero, Stefano
2009-07-29T15:47:19ZLearning SQL for Database Intrusion Detection using Context-sensitive ModellingApel, Martin; Bockermann, Christian; Meier, Michael
2009-07-29T15:47:17ZBrowser SSL-FingerprintingBockermann, Christian
2009-07-29T15:47:14ZBypassing Kernel-Integrity Protection MechanismsFreiling, Felix; Holz, Thorsten; Hund, Ralf
2009-07-29T15:47:12ZTracking Intelligence ProjectDell'Aera, Angelo
2009-07-29T15:47:09ZVisualization of Malware BehaviorTrinius, Philipp
2009-07-29T15:47:07ZAre botnets used to run phishing over the phone?Maggi, Federico
2009-07-29T15:47:04ZA Service Dependency Modeling Framework for Policy-based Response EnforcementCuppens-Boulahia, Nora; Cuppens, Frédéric; Debar, Hervé; Kheir, Nizar; Viinikka, Jouni
2009-07-29T15:47:02ZBrowser Fingerprinting from Coarse Traffic SummariesHuang, Xin; Monrose, Fabian; Reiter, Michael K.; Yen, Ting-Fang
2009-07-29T15:46:59ZUsing Contextual Information for IDS Alarm ClassificationEsfandiari, Babak; Gagnon, Francois; Massicotte, Frédéric
2009-07-29T15:46:57ZOn the Effectiveness of Software DiversityDeng, Robert H.; Gao, Debin; Han, Jin
2009-07-29T15:46:54ZPolymorphing Software by Randomizing Data Structure LayoutLin, Zhiqiang; Riley, Ryan; Xu, Dongyan
2009-07-29T15:46:52ZHow to Steal a Botnet and What Can Happen When You DoKemmerer, Richard
2009-07-29T15:46:49ZDefending Browsers against Drive-by DownloadsEgele, Manuel; Kirda, Engin; Kruegel, Christopher; Wurzinger, Peter
2009-07-29T15:46:47ZYataglassKono, Kenji; Shimamura, Makato
2009-07-29T15:46:45ZShepherding Loadable Kernel Module through On-demand EmulationBeyah, Raheem; Copeland, John; Xuan, Chaoting
2009-07-29T15:46:42ZTowards Proactive SPAM FilteringGöbel, Jan; Holz, Thorsten; Trinius, Philipp
2009-07-29T15:46:40ZA Case Study on Asprox Infection DynamicsGupta, Minaxi; Myers, Steven; Shin, Youngsang
2009-07-29T15:46:36ZProgram, Selection and StatisticsFlegel, Ulrich
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 20