Exploit the possiblities
Showing 1 - 25 of 27 RSS Feed

Files

Undermining-Anomaly-based-IDS.pdf
Posted Nov 1, 2006

Undermining an Anomalybased Intrusion Detection System Using Common Exploits.

tags | paper
MD5 | 443dd5a514c54a50ee9f99f326c78224
Using-Program-Behavior.pdf
Posted Nov 1, 2006

Using Program Behavior for Intrusion Detection.

tags | paper
MD5 | f5e8ed529e9cc0e9d615c03ebd009820
A-Real-Time-IDS-based-on-Learning.pdf
Posted Nov 1, 2006

A RealTime Intrusion Detection System based on Learning Program Behavior.

tags | paper
MD5 | 84238c1d65436ed0f60fb20cceafd411
An-Application-of-Machine-Learning-to-Anomaly-Detection.pdf
Posted Nov 1, 2006

An Application of Machine Learning to Anomaly Detection.

tags | paper
MD5 | 417f35d7adbe78b0c6307311981c0957
An-Immunological-Approach-to-Change-Detection-Analysis.pdf
Posted Nov 1, 2006

An Immunological Approach to Change Detection: Algorithms, Analysis and Implications.

tags | paper
MD5 | 2a2b542d736203c02905a744855dba33
An-Immunological-Approach-to-Change-Detection-Theory.pdf
Posted Nov 1, 2006

An Immunological Approach to Change Detection: Theoretical Results.

tags | paper
MD5 | 9b7e5aae518ec5d6aef156c1c8478a92
Automated-Response-Using-System-Call-Delays.pdf
Posted Nov 1, 2006

Automated Response Using SystemCall Delays.

tags | paper
MD5 | dd8349f140a2cd146e795ce1965e28d5
Automating-Mimicry-Attacks-Using-Static-Binary-Analysis.pdf
Posted Nov 1, 2006

Automating Mimicry Attacks Using Static Binary Analysis.

tags | paper
MD5 | f08eaabba049edacb27337c3fe7ed30d
Detecting-Intrusions-using-System-Calls.pdf
Posted Nov 1, 2006

Detecting Intrusions using System Calls: Alternative Data Models.

tags | paper
MD5 | 0952329f9a95bc150ef963e8364d61b5
Efficient-ID-using-Automaton-Inlining.pdf
Posted Nov 1, 2006

Efficient Intrusion Detection using Automaton Inlining.

tags | paper
MD5 | ace88b81821604ec16743e374cce4bcf
Finding-the-Vocabulary-of-Program-Behavior-Data-for-Anomaly-Detection.pdf
Posted Nov 1, 2006

Finding the Vocabulary of Program Behavior Data for Anomaly Detection.

tags | paper
MD5 | 9c512d2710669da9175290b0dcc8f5b4
Information-Theoretic-Measures-For-Anomaly-Detection.pdf
Posted Nov 1, 2006

InformationTheoretic Measures For Anomaly Detection.

tags | paper
MD5 | 1d78254f6e6b4db394de91f4a726ab95
Intrusion-Detection-using-Sequences-of-System-Calls.pdf
Posted Nov 1, 2006

Intrusion Detection using Sequences of System Calls.

tags | paper
MD5 | faab3a484f0449c0ffbf4499ed1a1515
Learning-Patterns-from-Unix-Process-Execution-Traces.pdf
Posted Nov 1, 2006

Learning Patterns from Unix Process Execution Traces for Intrusion Detection.

tags | paper
systems | unix
MD5 | 28f942dc0204ef86a96d60a0152e791e
Learning-Program-Behaviour.pdf
Posted Nov 1, 2006

Learning Program Behaviour Profiles for Intrusion Detection.

tags | paper
MD5 | 7b54da49ec055ea8778289423d224319
Learning-to-Detect-Malicious-Executables-in-the-Wild.pdf
Posted Nov 1, 2006

Learning to Detect Malicious Executables in the Wild.

tags | paper
MD5 | e39c058e42461830263c45d457b58124
Modeling-System-Calls-for-IDS.pdf
Posted Nov 1, 2006

Modeling System Calls for Intrusion Detection with Dynamic Window Sizes.

tags | paper
MD5 | bf22279adbdac5e5b9a6263f675cc234
On-gray-box-program-tracking-for-anomaly-detection.pdf
Posted Nov 1, 2006

On graybox program tracking for anomaly detection.

tags | paper
MD5 | 29cab56186f41283aabcabac5c13db19
On-the-Detection-of-Anomalous-System-Call-Arguments.pdf
Posted Nov 1, 2006

On the Detection of Anomalous System Call Arguments.

tags | paper
MD5 | 73211d76f2d1227cf758a325f075e868
Semantics-Aware-Malware-Detection.pdf
Posted Nov 1, 2006

SemanticsAware Malware Detection.

tags | paper
MD5 | 40e27c959fc89ddb994d55ffabcaed88
Sequence-Matching-and-Learning-in-Anomaly-Detection-for-Computer-Security.pdf
Posted Nov 1, 2006

Sequence Matching and Learning in Anomaly Detection for Computer Security.

tags | paper
MD5 | 572531e183a9071755fc68b6d9401722
Seurat-A-Pointillist-Approach-to-Anomaly-Detection.pdf
Posted Nov 1, 2006

Seurat: A Pointillist Approach to Anomaly Detection.

tags | paper
MD5 | ae8248f6c84dcb245992220a9054eacd
STATL-An-Attack-Language-for-State-based-ID.pdf
Posted Nov 1, 2006

STATL An Attack Language for State based Intrusion Detection.

tags | paper
MD5 | 11d2da10454793eba8f044048c145e90
Temporal-Sequence-Learning-and-Data-Reduction-for-Anomaly-Detection.pdf
Posted Nov 1, 2006

Temporal Sequence Learning and Data Reduction for Anomaly Detection.

tags | paper
MD5 | 1ffa59c9171a815a7cbb9bf83d95281f
Toward-Stealthy-Malware-Detection.pdf
Posted Nov 1, 2006

Toward Stealthy Malware Detection.

tags | paper
MD5 | 8ece4b4d508a3e13428eb02314bd0e92
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
NYPD Cops Need A Warrant To Snoop On Your Phone
Posted Nov 17, 2017

tags | headline, government, privacy, usa, phone
Oracle Scrambles To Fix Security Flaws In Tuxedo
Posted Nov 17, 2017

tags | headline, database, flaw, oracle
Github To Devs: Now You'll Get Security Alerts On Flaws In Popular Software Libraries
Posted Nov 17, 2017

tags | headline, flaw
Keystone Pipeline Leaked 210,000 Gallons Of Oil In South Dakota
Posted Nov 17, 2017

tags | headline, flaw
Cash Converters Reveals Data Breach
Posted Nov 16, 2017

tags | headline, hacker, cybercrime, data loss, fraud, identity theft
Kaspersky Defends Its Role In NSA Breach
Posted Nov 16, 2017

tags | headline, government, malware, usa, russia, data loss, spyware, nsa
McAfee Anti-Hacking Service Exposed Users To Banking Malware
Posted Nov 16, 2017

tags | headline, malware, bank, cybercrime, fraud, flaw, identity theft, mcafee
DJI Bug Bounty NDA Is 'Not Signable', Say Irate Infosec Researchers
Posted Nov 16, 2017

tags | headline, hacker, flaw
Government Just Figures Out You Can Hack Planes Remotely Due To Poor Design
Posted Nov 15, 2017

tags | headline, government, usa, flaw, terror
UK Security Chief Blames Russia For Hacks
Posted Nov 15, 2017

tags | headline, hacker, government, britain, russia, cyberwar
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close