Index of /papers/IDS/hids

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]USTAT-Real-Time-IDS-for-Unix.pdf2006-11-01 16:23 14M 
[   ]Toward-Stealthy-Malware-Detection.pdf2006-11-01 16:23 861K 
[   ]Seurat-A-Pointillist-Approach-to-Anomaly-Detection.pdf2006-11-01 16:23 717K 
[   ]STATL-An-Attack-Language-for-State-based-ID.pdf2006-11-01 16:23 502K 
[   ]An-Immunological-Approach-to-Change-Detection-Analysis.pdf2006-11-01 16:23 438K 
[   ]Efficient-ID-using-Automaton-Inlining.pdf2006-11-01 16:23 381K 
[   ]Automating-Mimicry-Attacks-Using-Static-Binary-Analysis.pdf2006-11-01 16:23 352K 
[   ]Information-Theoretic-Measures-For-Anomaly-Detection.pdf2006-11-01 16:23 305K 
[   ]A-Real-Time-IDS-based-on-Learning.pdf2006-11-01 16:23 284K 
[   ]Temporal-Sequence-Learning-and-Data-Reduction-for-Anomaly-Detection.pdf2006-11-01 16:23 281K 
[   ]Semantics-Aware-Malware-Detection.pdf2006-11-01 16:23 279K 
[   ]On-gray-box-program-tracking-for-anomaly-detection.pdf2006-11-01 16:23 253K 
[   ]On-the-Detection-of-Anomalous-System-Call-Arguments.pdf2006-11-01 16:23 240K 
[   ]Learning-Program-Behaviour.pdf2006-11-01 16:23 216K 
[   ]Learning-to-Detect-Malicious-Executables-in-the-Wild.pdf2006-11-01 16:23 211K 
[   ]Detecting-Intrusions-using-System-Calls.pdf2006-11-01 16:23 183K 
[   ]Using-Program-Behavior.pdf2006-11-01 16:23 179K 
[   ]Undermining-Anomaly-based-IDS.pdf2006-11-01 16:23 156K 
[   ]Sequence-Matching-and-Learning-in-Anomaly-Detection-for-Computer-Security.pdf2006-11-01 16:23 149K 
[   ]Intrusion-Detection-using-Sequences-of-System-Calls.pdf2006-11-01 16:23 144K 
[   ]Two-state-based-approaches-to-Program-based-Anomaly-Detection.pdf2006-11-01 16:23 132K 
[   ]Finding-the-Vocabulary-of-Program-Behavior-Data-for-Anomaly-Detection.pdf2006-11-01 16:23 127K 
[   ]An-Application-of-Machine-Learning-to-Anomaly-Detection.pdf2006-11-01 16:23 125K 
[   ]Modeling-System-Calls-for-IDS.pdf2006-11-01 16:23 125K 
[   ]Automated-Response-Using-System-Call-Delays.pdf2006-11-01 16:23 104K 
[   ]Learning-Patterns-from-Unix-Process-Execution-Traces.pdf2006-11-01 16:23 62K 
[   ]An-Immunological-Approach-to-Change-Detection-Theory.pdf2006-11-01 16:23 56K 
[TXT]indexsize2.html2010-11-14 14:12 268  
[TXT]indexsize.html2010-11-14 14:12 268  
[TXT]indexdate2.html2010-11-14 14:12 268  
[TXT]indexdate.html2010-11-14 14:12 268  

Apache/2.4.52 (Ubuntu) Server at www2.packetstormsecurity.org Port 80