Search Results
2. Unsupervised Anomaly-based Malware Detection using Hardware Features
3. Combining a Baiting and a User Search Profiling Techniques for Masquerade Detection
4. Concurrency Attacks
5. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned
6. Markov Models for Network-Behavior Modeling and Anonymization
7. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
8. Modeling User Search Behavior for Masquerade Detection
9. Modeling User Search-Behavior for Masquerade Detection
10. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating
11. Masquerade Attack Detection Using a Search-Behavior Modeling Approach
12. Self-monitoring Monitors
13. Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode
14. Thwarting Attacks in Malcode-Bearing Documents by Altering Data Sector Values
15. Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems
16. SPARSE: A Hybrid System to Detect Malcode-Bearing Documents
17. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
18. Automated Social Hierarchy Detection through Email Network Analysis
19. BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs
20. On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection
- « Previous
- Next »
- 1
- 2
- 3
- 4