what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 102 RSS Feed

Files Date: 2006-11-01 to 2006-11-02

Using-Aritificial-Anomalies-to-Detect-Unknown-and-Known-Network-Intrusions.pdf
Posted Nov 1, 2006

Using Aritificial Anomalies to Detect Unknown and Known Network Intrusions.

tags | paper
SHA-256 | 3b377a761ba35262df65a76dd11b3dbc95ee7a4736d59ecf1eb8a64df9199939
Using-Program-Behavior.pdf
Posted Nov 1, 2006

Using Program Behavior for Intrusion Detection.

tags | paper
SHA-256 | 095e99067c52c8430859ca16f922ac5e9d525d0d3381bb91f5e9d21f45cf1521
A-Real-Time-IDS-based-on-Learning.pdf
Posted Nov 1, 2006

A RealTime Intrusion Detection System based on Learning Program Behavior.

tags | paper
SHA-256 | 0e8a47781283f6cc330dddf6e88f496211be2a23d3b455a2013438fb5378ecbb
An-Application-of-Machine-Learning-to-Anomaly-Detection.pdf
Posted Nov 1, 2006

An Application of Machine Learning to Anomaly Detection.

tags | paper
SHA-256 | 382e3dd60f7bbf10b274abc609279cb4d359796893a194a890770cbccf87e701
An-Immunological-Approach-to-Change-Detection-Analysis.pdf
Posted Nov 1, 2006

An Immunological Approach to Change Detection: Algorithms, Analysis and Implications.

tags | paper
SHA-256 | 9aa8bbbecb2de8548f2276bf36961313f1b9e3ab6748c5453b3acfc1b4efd985
An-Immunological-Approach-to-Change-Detection-Theory.pdf
Posted Nov 1, 2006

An Immunological Approach to Change Detection: Theoretical Results.

tags | paper
SHA-256 | 95faad21fd70965a18837c10fb2a81fbe827e1475d74801711a98253908727b0
Automated-Response-Using-System-Call-Delays.pdf
Posted Nov 1, 2006

Automated Response Using SystemCall Delays.

tags | paper
SHA-256 | 17ab8d2f521a6b3f79599f73f4e739dfb06dbfaf37e1dd709de442d386cd08d8
Automating-Mimicry-Attacks-Using-Static-Binary-Analysis.pdf
Posted Nov 1, 2006

Automating Mimicry Attacks Using Static Binary Analysis.

tags | paper
SHA-256 | 30aef93f1ffb8832520b77cbc90b428e316b0f4afd0c3b491987119eaf293892
Detecting-Intrusions-using-System-Calls.pdf
Posted Nov 1, 2006

Detecting Intrusions using System Calls: Alternative Data Models.

tags | paper
SHA-256 | e6d257f0ecb406b34c24ab3a21a6a52b96c3251d836a63a10e5236598b1e6ba1
Efficient-ID-using-Automaton-Inlining.pdf
Posted Nov 1, 2006

Efficient Intrusion Detection using Automaton Inlining.

tags | paper
SHA-256 | 1bf5e18ed8061a325ff7d6e60c781df4178d42054868898d6d203c57e0439bc1
Finding-the-Vocabulary-of-Program-Behavior-Data-for-Anomaly-Detection.pdf
Posted Nov 1, 2006

Finding the Vocabulary of Program Behavior Data for Anomaly Detection.

tags | paper
SHA-256 | 4c110f1285a6f5e8ce0ed3b7c3655e920312a4dd60c2526b0672eef2f741c9fb
Information-Theoretic-Measures-For-Anomaly-Detection.pdf
Posted Nov 1, 2006

InformationTheoretic Measures For Anomaly Detection.

tags | paper
SHA-256 | 1b15c3199ddf8d0851f4cfe4ec8cd25b039646b91098bf7ad1bdfc1a85ccac7e
Intrusion-Detection-using-Sequences-of-System-Calls.pdf
Posted Nov 1, 2006

Intrusion Detection using Sequences of System Calls.

tags | paper
SHA-256 | 88f58bcab94c60c99c7af65ed5a7b543d6c2557de45ed919f9d51dc9a62362f1
Learning-Patterns-from-Unix-Process-Execution-Traces.pdf
Posted Nov 1, 2006

Learning Patterns from Unix Process Execution Traces for Intrusion Detection.

tags | paper
systems | unix
SHA-256 | 774c5fb4d8f87da96428a0aba0863ebb08b7dc6c1ac0ebbdac5fdf4f01a312da
Learning-Program-Behaviour.pdf
Posted Nov 1, 2006

Learning Program Behaviour Profiles for Intrusion Detection.

tags | paper
SHA-256 | 51ceb245216f818009566c49aa6b0d76d3cb2a40afe1dd0977a3a0a5ff9a9fe1
Learning-to-Detect-Malicious-Executables-in-the-Wild.pdf
Posted Nov 1, 2006

Learning to Detect Malicious Executables in the Wild.

tags | paper
SHA-256 | c1e130b97d30c340298185af4b756e8de4e6af8708c67c9a3a10c45724bf473a
Modeling-System-Calls-for-IDS.pdf
Posted Nov 1, 2006

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes.

tags | paper
SHA-256 | 277603d8959ac2e9d0649d958ee67ec765b961ff534ddedb8b430b98b8c6a9ff
On-gray-box-program-tracking-for-anomaly-detection.pdf
Posted Nov 1, 2006

On graybox program tracking for anomaly detection.

tags | paper
SHA-256 | 73ef3b11daf8d4b271cd8a293379bb7cf36d6f7dd05c9636fe70bb23324fe1dc
On-the-Detection-of-Anomalous-System-Call-Arguments.pdf
Posted Nov 1, 2006

On the Detection of Anomalous System Call Arguments.

tags | paper
SHA-256 | e4c709e5d57a0f7215abff88f38e074315b3e5b479c1586319221f8b26168610
Semantics-Aware-Malware-Detection.pdf
Posted Nov 1, 2006

SemanticsAware Malware Detection.

tags | paper
SHA-256 | acd5ff730942de2c3d487ac04bd1e50c79bbf563265482dc51bf3153836c71f5
Sequence-Matching-and-Learning-in-Anomaly-Detection-for-Computer-Security.pdf
Posted Nov 1, 2006

Sequence Matching and Learning in Anomaly Detection for Computer Security.

tags | paper
SHA-256 | 4e4df0e8fa211b324a995602cf6485365fc58bbc1dc1494e369e1b81c999a590
Seurat-A-Pointillist-Approach-to-Anomaly-Detection.pdf
Posted Nov 1, 2006

Seurat: A Pointillist Approach to Anomaly Detection.

tags | paper
SHA-256 | 3b4475036b79c71066d1f4dd4b114848a2067647ac58d6987a0041971ef535d7
STATL-An-Attack-Language-for-State-based-ID.pdf
Posted Nov 1, 2006

STATL An Attack Language for State based Intrusion Detection.

tags | paper
SHA-256 | 52ef3a77ef509bcd93944cd914a2b5dfc8745d9b707ce5bc1e7c37a4a891cfff
Temporal-Sequence-Learning-and-Data-Reduction-for-Anomaly-Detection.pdf
Posted Nov 1, 2006

Temporal Sequence Learning and Data Reduction for Anomaly Detection.

tags | paper
SHA-256 | aea7a380aba430d2d764541688177ed8760417006a7255dfff6dd30e81c59a52
Toward-Stealthy-Malware-Detection.pdf
Posted Nov 1, 2006

Toward Stealthy Malware Detection.

tags | paper
SHA-256 | 8ac299a45aaf4507a6fc8d0ec39231c1eac1334a256a455de448f6665466ecda
Page 4 of 5
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close