Sciweavers

Share
RAID
2010
Springer
8 years 6 months ago
Abusing Social Networks for Automated User Profiling
Recently, social networks such as Facebook have experienced a huge surge in popularity. The amount of personal information stored on these sites calls for appropriate security prec...
Marco Balduzzi, Christian Platzer, Thorsten Holz, ...
RAID
2010
Springer
8 years 6 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
RAID
2010
Springer
8 years 6 months ago
What Is the Impact of P2P Traffic on Anomaly Detection?
Abstract. Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today's Internet traffic [1]. Surprisingly, the impact of p2p traffic on anomaly detectio...
Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Kh...
RAID
2010
Springer
8 years 6 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
RAID
2010
Springer
8 years 6 months ago
A Centralized Monitoring Infrastructure for Improving DNS Security
Manos Antonakakis, David Dagon, Xiapu Luo, Roberto...
RAID
2010
Springer
8 years 6 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
RAID
2010
Springer
8 years 6 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
RAID
2010
Springer
8 years 6 months ago
On Challenges in Evaluating Malware Clustering
Malware clustering and classification are important tools that enable analysts to prioritize their malware analysis efforts. The recent emergence of fully automated methods for ma...
Peng Li, Limin Liu, Debin Gao, Michael K. Reiter
RAID
2010
Springer
8 years 6 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
books