close
1.

電子ブック

EB
Diego Zamboni, Takeo Kanade, Christopher Kruegel
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
2.

電子ブック

EB
Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
出版情報: Springer eBooks Computer Science , Dordrecht : Springer US, 2005
所蔵情報: loading…
3.

電子ブック

EB
Christopher Kruegel, Andrew Clark, Takeo Kanade, Richard Lippmann
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Host-Based Intrusion Detection
Exploiting Execution Context for the Detection of Anomalous System Calls / Darren Mutz ; William Robertson ; Giovanni Vigna ; Richard Kemmerer
Understanding Precision in Host Based Intrusion Detection / Monirul Sharif ; Kapil Singh ; Jonathon Giffin ; Wenke Lee
Anomaly-Based Intrusion Detection
Comparing Anomaly Detection Techniques for HTTP / Kenneth L. Ingham ; Hajime Inoue
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications / Marco Cova ; Davide Balzarotti ; Viktoria Felmetsger
Network-Based Intrusion Detection and Response
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode / Michalis Polychronakis ; Kostas G. Anagnostakis ; Evangelos P. Markatos
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware / Matthias Vallentin ; Robin Sommer ; Jason Lee ; Craig Leres ; Vern Paxson ; Brian Tierney
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks / Shiau-Huey Wang ; Chinyang Henry Tseng ; Karl Levitt ; Matthew Bishop
Insider Detection and Alert Correlation
Elicit: A System for Detecting Insiders Who Violate Need-to-Know / Marcus A. Maloof ; Gregory D. Stephens
On the Use of Different Statistical Tests for Alert Correlation - Short Paper / Federico Maggi ; Stefano Zanero
Malicious Code Analysis
Automated Classification and Analysis of Internet Malware / Michael Bailey ; Jon Oberheide ; Jon Andersen ; Z. Morley Mao ; Farnam Jahanian ; Jose Nazario
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots / Xuxian Jiang ; Xinyuan Wang
A Forced Sampled Execution Approach to Kernel Rootkit Identification / Jeffrey Wilhelm ; Tzi-cker Chiueh
Evasion
Advanced Allergy Attacks: Does a Corpus Really Help? / Simon P. Chung ; Aloysius K. Mok
Alert Verification Evasion Through Server Response Forging / Adam D. Todd ; Richard A. Raines ; Rusty O. Baldwin ; Barry E. Mullins ; Steven K. Rogers
Malicious Code Defense
Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs / M. Patrick Collins ; Michael K. Reiter
SpyShield: Preserving Privacy from Spy Add-Ons / Zhuowei Li ; XiaoFeng Wang ; Jong Youl Choi
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems / John R. Lange ; Peter A. Dinda ; Fabian E. Bustamante
Author Index
Host-Based Intrusion Detection
Exploiting Execution Context for the Detection of Anomalous System Calls / Darren Mutz ; William Robertson ; Giovanni Vigna ; Richard Kemmerer
Understanding Precision in Host Based Intrusion Detection / Monirul Sharif ; Kapil Singh ; Jonathon Giffin ; Wenke Lee
4.

電子ブック

EB
DIMVA 2005, Klaus Julisch, Takeo Kanade, Christopher Kruegel
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
5.

図書

図書
ed. Diego Zamboni, Christopher Kruegel
出版情報: Berlin : Springer, c2006  xii, 330 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4219
所蔵情報: loading…
6.

電子ブック

EB
DIMVA 2005, Klaus Julisch, Takeo Kanade, Christopher Kruegel, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
7.

電子ブック

EB
Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
出版情報: SpringerLink Books - AutoHoldings , Dordrecht : Springer US, 2005
所蔵情報: loading…
8.

電子ブック

EB
Diego Zamboni, Takeo Kanade, Christopher Kruegel, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
9.

電子ブック

EB
RAID 2003, Erland Jonsson, Christopher Kruegel, Giovanni Vigna
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2003
所蔵情報: loading…
目次情報: 続きを見る
Network Infrastructure
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller / M. Tylutki ; K. Levitt
Topology-Based Detection of Anomalous BGP Messages / C. Kruegel ; D. Mutz ; W. Robertson ; F. Valeur
Anomaly Detection I
Detecting Anomalous Network Traffic with Self-organizing Maps / M. Ramadas ; S. Ostermann ; B. Tjaden
An Approach for Detecting Self-propagating Email Using Anomaly Detection / A. Gupta ; R. Sekar
Correlation
Statistical Causality Analysis of INFOSEC Alert Data / X. Qin ; W. Lee
Correlation of Intrusion Symptoms: An Application of Chronicles / B. Morin ; H. Debar
Modeling and Specification
Modehng Computer Attacks: An Ontology for Intrusion Detection / J. Undercoffer ; A. Joshi ; J. Pinkston
Using Specification-Based Intrusion Detection for Automated Response / I. Balepin ; S. Maltsev ; J. Rowe
IDS Sensors
Characterizing the Performance of Network Intrusion Detection Sensors / L. Schaelicke ; T. Slabach ; B. Moore ; C. Freeland
Using Decision Trees to Improve Signature-Based Intrusion Detection / T. Totti
Ambiguity Resolution via Passive OS Fingerprinting / G. Taleck
Anomaly Detection II
Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems / S.-B. Cho ; S.-J. Han
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection / M.V. Mahoney ; P.K. Chan
Author Index
Network Infrastructure
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller / M. Tylutki ; K. Levitt
Topology-Based Detection of Anomalous BGP Messages / C. Kruegel ; D. Mutz ; W. Robertson ; F. Valeur
10.

電子ブック

EB
Christopher Kruegel, Andrew Clark, Takeo Kanade, Richard Lippmann
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Host-Based Intrusion Detection
Exploiting Execution Context for the Detection of Anomalous System Calls / Darren Mutz ; William Robertson ; Giovanni Vigna ; Richard Kemmerer
Understanding Precision in Host Based Intrusion Detection / Monirul Sharif ; Kapil Singh ; Jonathon Giffin ; Wenke Lee
Anomaly-Based Intrusion Detection
Comparing Anomaly Detection Techniques for HTTP / Kenneth L. Ingham ; Hajime Inoue
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications / Marco Cova ; Davide Balzarotti ; Viktoria Felmetsger
Network-Based Intrusion Detection and Response
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode / Michalis Polychronakis ; Kostas G. Anagnostakis ; Evangelos P. Markatos
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware / Matthias Vallentin ; Robin Sommer ; Jason Lee ; Craig Leres ; Vern Paxson ; Brian Tierney
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks / Shiau-Huey Wang ; Chinyang Henry Tseng ; Karl Levitt ; Matthew Bishop
Insider Detection and Alert Correlation
Elicit: A System for Detecting Insiders Who Violate Need-to-Know / Marcus A. Maloof ; Gregory D. Stephens
On the Use of Different Statistical Tests for Alert Correlation - Short Paper / Federico Maggi ; Stefano Zanero
Malicious Code Analysis
Automated Classification and Analysis of Internet Malware / Michael Bailey ; Jon Oberheide ; Jon Andersen ; Z. Morley Mao ; Farnam Jahanian ; Jose Nazario
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots / Xuxian Jiang ; Xinyuan Wang
A Forced Sampled Execution Approach to Kernel Rootkit Identification / Jeffrey Wilhelm ; Tzi-cker Chiueh
Evasion
Advanced Allergy Attacks: Does a Corpus Really Help? / Simon P. Chung ; Aloysius K. Mok
Alert Verification Evasion Through Server Response Forging / Adam D. Todd ; Richard A. Raines ; Rusty O. Baldwin ; Barry E. Mullins ; Steven K. Rogers
Malicious Code Defense
Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs / M. Patrick Collins ; Michael K. Reiter
SpyShield: Preserving Privacy from Spy Add-Ons / Zhuowei Li ; XiaoFeng Wang ; Jong Youl Choi
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems / John R. Lange ; Peter A. Dinda ; Fabian E. Bustamante
Author Index
Host-Based Intrusion Detection
Exploiting Execution Context for the Detection of Anomalous System Calls / Darren Mutz ; William Robertson ; Giovanni Vigna ; Richard Kemmerer
Understanding Precision in Host Based Intrusion Detection / Monirul Sharif ; Kapil Singh ; Jonathon Giffin ; Wenke Lee
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼