Jaehyun Nam, M. Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park
{"title":"Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors","authors":"Jaehyun Nam, M. Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park","doi":"10.1007/978-3-319-26362-5_5","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_5","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123279055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yangyi Chen, Vincent Bindschaedler, Xiaofeng Wang, Stefan Berger, D. Pendarakis
{"title":"Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting","authors":"Yangyi Chen, Vincent Bindschaedler, Xiaofeng Wang, Stefan Berger, D. Pendarakis","doi":"10.1007/978-3-319-26362-5_27","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_27","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aleksandar Milenkoski, B. Payne, Nuno Antunes, M. Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft
{"title":"Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection","authors":"Aleksandar Milenkoski, B. Payne, Nuno Antunes, M. Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft","doi":"10.1007/978-3-319-26362-5_22","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_22","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129117601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Risk Assessment on Online Photos","authors":"Haitao Xu, Haining Wang, A. Stavrou","doi":"10.1007/978-3-319-26362-5_20","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_20","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WYSISNWIV: What You Scan Is Not What I Visit","authors":"Q. Yang, D. Damopoulos, G. Portokalidis","doi":"10.1007/978-3-319-26362-5_15","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_15","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133252759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kartik Nayak, Daniel Marino, P. Efstathopoulos, T. Dumitras
{"title":"Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild","authors":"Kartik Nayak, Daniel Marino, P. Efstathopoulos, T. Dumitras","doi":"10.1007/978-3-319-11379-1_21","DOIUrl":"https://doi.org/10.1007/978-3-319-11379-1_21","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kevin D. Bowers, Catherine Hart, A. Juels, Nikos Triandopoulos
{"title":"PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging","authors":"Kevin D. Bowers, Catherine Hart, A. Juels, Nikos Triandopoulos","doi":"10.1007/978-3-319-11379-1_3","DOIUrl":"https://doi.org/10.1007/978-3-319-11379-1_3","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126032474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Abbasi, J. Wetzels, Wouter Bokslag, E. Zambon, S. Etalle
{"title":"On Emulation-Based Network Intrusion Detection Systems","authors":"A. Abbasi, J. Wetzels, Wouter Bokslag, E. Zambon, S. Etalle","doi":"10.1007/978-3-319-11379-1_19","DOIUrl":"https://doi.org/10.1007/978-3-319-11379-1_19","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133620871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}