Sciweavers

RAID
2009
Springer
13 years 9 months ago
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection
Guanhua Yan, Stephan Eidenbenz, Emanuele Galli
RAID
2009
Springer
13 years 11 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
RAID
2009
Springer
13 years 11 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...
RAID
2009
Springer
13 years 11 months ago
Regular Expression Matching on Graphics Hardware for Intrusion Detection
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
Giorgos Vasiliadis, Michalis Polychronakis, Spyros...
RAID
2009
Springer
13 years 11 months ago
Exploiting Temporal Persistence to Detect Covert Botnet Channels
Frédéric Giroire, Jaideep Chandrashe...
RAID
2009
Springer
13 years 11 months ago
Automatic Generation of String Signatures for Malware Detection
Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Ch...
RAID
2009
Springer
13 years 11 months ago
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration
Abstract. Signature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures ...
Juan Caballero, Zhenkai Liang, Pongsin Poosankam, ...
RAID
2009
Springer
13 years 11 months ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen