129
click to vote
CCS
15 years 6 months ago
2003 ACM
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
155
click to vote
SEC
15 years 2 months ago
2003
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
126
click to vote
CCS
15 years 6 months ago
2003 ACM
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
115
click to vote
WORM
15 years 2 months ago
2003
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
117
click to vote
CSREASAM
15 years 2 months ago
2003
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
|