Twenty Year Anniversary
Showing 1 - 25 of 27 RSS Feed

Files

Undermining-Anomaly-based-IDS.pdf
Posted Nov 1, 2006

Undermining an Anomalybased Intrusion Detection System Using Common Exploits.

tags | paper
MD5 | 443dd5a514c54a50ee9f99f326c78224
Using-Program-Behavior.pdf
Posted Nov 1, 2006

Using Program Behavior for Intrusion Detection.

tags | paper
MD5 | f5e8ed529e9cc0e9d615c03ebd009820
A-Real-Time-IDS-based-on-Learning.pdf
Posted Nov 1, 2006

A RealTime Intrusion Detection System based on Learning Program Behavior.

tags | paper
MD5 | 84238c1d65436ed0f60fb20cceafd411
An-Application-of-Machine-Learning-to-Anomaly-Detection.pdf
Posted Nov 1, 2006

An Application of Machine Learning to Anomaly Detection.

tags | paper
MD5 | 417f35d7adbe78b0c6307311981c0957
An-Immunological-Approach-to-Change-Detection-Analysis.pdf
Posted Nov 1, 2006

An Immunological Approach to Change Detection: Algorithms, Analysis and Implications.

tags | paper
MD5 | 2a2b542d736203c02905a744855dba33
An-Immunological-Approach-to-Change-Detection-Theory.pdf
Posted Nov 1, 2006

An Immunological Approach to Change Detection: Theoretical Results.

tags | paper
MD5 | 9b7e5aae518ec5d6aef156c1c8478a92
Automated-Response-Using-System-Call-Delays.pdf
Posted Nov 1, 2006

Automated Response Using SystemCall Delays.

tags | paper
MD5 | dd8349f140a2cd146e795ce1965e28d5
Automating-Mimicry-Attacks-Using-Static-Binary-Analysis.pdf
Posted Nov 1, 2006

Automating Mimicry Attacks Using Static Binary Analysis.

tags | paper
MD5 | f08eaabba049edacb27337c3fe7ed30d
Detecting-Intrusions-using-System-Calls.pdf
Posted Nov 1, 2006

Detecting Intrusions using System Calls: Alternative Data Models.

tags | paper
MD5 | 0952329f9a95bc150ef963e8364d61b5
Efficient-ID-using-Automaton-Inlining.pdf
Posted Nov 1, 2006

Efficient Intrusion Detection using Automaton Inlining.

tags | paper
MD5 | ace88b81821604ec16743e374cce4bcf
Finding-the-Vocabulary-of-Program-Behavior-Data-for-Anomaly-Detection.pdf
Posted Nov 1, 2006

Finding the Vocabulary of Program Behavior Data for Anomaly Detection.

tags | paper
MD5 | 9c512d2710669da9175290b0dcc8f5b4
Information-Theoretic-Measures-For-Anomaly-Detection.pdf
Posted Nov 1, 2006

InformationTheoretic Measures For Anomaly Detection.

tags | paper
MD5 | 1d78254f6e6b4db394de91f4a726ab95
Intrusion-Detection-using-Sequences-of-System-Calls.pdf
Posted Nov 1, 2006

Intrusion Detection using Sequences of System Calls.

tags | paper
MD5 | faab3a484f0449c0ffbf4499ed1a1515
Learning-Patterns-from-Unix-Process-Execution-Traces.pdf
Posted Nov 1, 2006

Learning Patterns from Unix Process Execution Traces for Intrusion Detection.

tags | paper
systems | unix
MD5 | 28f942dc0204ef86a96d60a0152e791e
Learning-Program-Behaviour.pdf
Posted Nov 1, 2006

Learning Program Behaviour Profiles for Intrusion Detection.

tags | paper
MD5 | 7b54da49ec055ea8778289423d224319
Learning-to-Detect-Malicious-Executables-in-the-Wild.pdf
Posted Nov 1, 2006

Learning to Detect Malicious Executables in the Wild.

tags | paper
MD5 | e39c058e42461830263c45d457b58124
Modeling-System-Calls-for-IDS.pdf
Posted Nov 1, 2006

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes.

tags | paper
MD5 | bf22279adbdac5e5b9a6263f675cc234
On-gray-box-program-tracking-for-anomaly-detection.pdf
Posted Nov 1, 2006

On graybox program tracking for anomaly detection.

tags | paper
MD5 | 29cab56186f41283aabcabac5c13db19
On-the-Detection-of-Anomalous-System-Call-Arguments.pdf
Posted Nov 1, 2006

On the Detection of Anomalous System Call Arguments.

tags | paper
MD5 | 73211d76f2d1227cf758a325f075e868
Semantics-Aware-Malware-Detection.pdf
Posted Nov 1, 2006

SemanticsAware Malware Detection.

tags | paper
MD5 | 40e27c959fc89ddb994d55ffabcaed88
Sequence-Matching-and-Learning-in-Anomaly-Detection-for-Computer-Security.pdf
Posted Nov 1, 2006

Sequence Matching and Learning in Anomaly Detection for Computer Security.

tags | paper
MD5 | 572531e183a9071755fc68b6d9401722
Seurat-A-Pointillist-Approach-to-Anomaly-Detection.pdf
Posted Nov 1, 2006

Seurat: A Pointillist Approach to Anomaly Detection.

tags | paper
MD5 | ae8248f6c84dcb245992220a9054eacd
STATL-An-Attack-Language-for-State-based-ID.pdf
Posted Nov 1, 2006

STATL An Attack Language for State based Intrusion Detection.

tags | paper
MD5 | 11d2da10454793eba8f044048c145e90
Temporal-Sequence-Learning-and-Data-Reduction-for-Anomaly-Detection.pdf
Posted Nov 1, 2006

Temporal Sequence Learning and Data Reduction for Anomaly Detection.

tags | paper
MD5 | 1ffa59c9171a815a7cbb9bf83d95281f
Toward-Stealthy-Malware-Detection.pdf
Posted Nov 1, 2006

Toward Stealthy Malware Detection.

tags | paper
MD5 | 8ece4b4d508a3e13428eb02314bd0e92
Page 1 of 2
Back12Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Ether Doesn't Fall Under SEC Rules
Posted Jun 15, 2018

tags | headline, government, bank, usa, cryptography
Decades-Old PGP Bug Allowed Hackers To Spoof Just About Anyone's Signature
Posted Jun 15, 2018

tags | headline, flaw, cryptography
LuckyMouse Threat Group Attacks Government Websites
Posted Jun 14, 2018

tags | headline, hacker, government, malware, china
US Senators Get Digging To Find Out The Truth About FCC DDoS Attack
Posted Jun 14, 2018

tags | headline, government, usa, denial of service, fraud
Backdoored Images Downloaded 5 Million Times Finally Removed From Docker Hub
Posted Jun 14, 2018

tags | headline, hacker, fraud, backdoor
Apple To Patch Flaw FBI Has Been Using To Hack iPhones
Posted Jun 14, 2018

tags | headline, government, privacy, usa, phone, flaw, patch, apple, fbi
Microsoft Fixes Cortana Lock Screen Bypass Flaw
Posted Jun 14, 2018

tags | headline, microsoft, flaw, password, patch
Paladin's Anti-Hacking Browser Extension Looks Like Snake Oil
Posted Jun 14, 2018

tags | headline, hacker
Intel Chip Flaw - Math Unit May Spill Crypto Secrets To Apps
Posted Jun 14, 2018

tags | headline, data loss, flaw, cryptography, intel
Smart Lock Can Be Hacked In Seconds
Posted Jun 13, 2018

tags | headline, hacker, flaw
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close