International Symposium on Recent Advances in Intrusion Detection最新文献

筛选
英文 中文
Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors 基于多核处理器的网络入侵检测性能扩展
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_5
Jaehyun Nam, M. Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park
{"title":"Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors","authors":"Jaehyun Nam, M. Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park","doi":"10.1007/978-3-319-26362-5_5","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_5","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123279055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware AppSpear:字节码解密和DEX重组包装Android恶意软件
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_17
Wenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu
{"title":"AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware","authors":"Wenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu","doi":"10.1007/978-3-319-26362-5_17","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_17","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting 精英:弹性检测服务的自动编排,以确保云托管的安全
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_27
Yangyi Chen, Vincent Bindschaedler, Xiaofeng Wang, Stefan Berger, D. Pendarakis
{"title":"Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting","authors":"Yangyi Chen, Vincent Bindschaedler, Xiaofeng Wang, Stefan Berger, D. Pendarakis","doi":"10.1007/978-3-319-26362-5_27","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_27","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware-Assisted Fine-Grained Code-Reuse Attack Detection 硬件辅助的细粒度代码重用攻击检测
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_4
Pinghai Yuan, Qingkai Zeng, Xuhua Ding
{"title":"Hardware-Assisted Fine-Grained Code-Reuse Attack Detection","authors":"Pinghai Yuan, Qingkai Zeng, Xuhua Ding","doi":"10.1007/978-3-319-26362-5_4","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_4","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124699920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection 基于攻击注入的虚拟环境入侵检测系统评估
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_22
Aleksandar Milenkoski, B. Payne, Nuno Antunes, M. Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft
{"title":"Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection","authors":"Aleksandar Milenkoski, B. Payne, Nuno Antunes, M. Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft","doi":"10.1007/978-3-319-26362-5_22","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_22","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129117601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Privacy Risk Assessment on Online Photos 网上照片私隐风险评估
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_20
Haitao Xu, Haining Wang, A. Stavrou
{"title":"Privacy Risk Assessment on Online Photos","authors":"Haitao Xu, Haining Wang, A. Stavrou","doi":"10.1007/978-3-319-26362-5_20","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_20","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
WYSISNWIV: What You Scan Is Not What I Visit WYSISNWIV:你扫描的不是我访问的
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_15
Q. Yang, D. Damopoulos, G. Portokalidis
{"title":"WYSISNWIV: What You Scan Is Not What I Visit","authors":"Q. Yang, D. Damopoulos, G. Portokalidis","doi":"10.1007/978-3-319-26362-5_15","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_15","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133252759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild 一些漏洞是不同于其他的-研究漏洞和攻击面在野外
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-11379-1_21
Kartik Nayak, Daniel Marino, P. Efstathopoulos, T. Dumitras
{"title":"Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild","authors":"Kartik Nayak, Daniel Marino, P. Efstathopoulos, T. Dumitras","doi":"10.1007/978-3-319-11379-1_21","DOIUrl":"https://doi.org/10.1007/978-3-319-11379-1_21","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging PillarBox:打击下一代恶意软件与快速前向安全日志
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-11379-1_3
Kevin D. Bowers, Catherine Hart, A. Juels, Nikos Triandopoulos
{"title":"PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging","authors":"Kevin D. Bowers, Catherine Hart, A. Juels, Nikos Triandopoulos","doi":"10.1007/978-3-319-11379-1_3","DOIUrl":"https://doi.org/10.1007/978-3-319-11379-1_3","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126032474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
On Emulation-Based Network Intrusion Detection Systems 基于仿真的网络入侵检测系统研究
International Symposium on Recent Advances in Intrusion Detection Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-11379-1_19
A. Abbasi, J. Wetzels, Wouter Bokslag, E. Zambon, S. Etalle
{"title":"On Emulation-Based Network Intrusion Detection Systems","authors":"A. Abbasi, J. Wetzels, Wouter Bokslag, E. Zambon, S. Etalle","doi":"10.1007/978-3-319-11379-1_19","DOIUrl":"https://doi.org/10.1007/978-3-319-11379-1_19","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133620871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信