首页 > 最新文献

International Symposium on Recent Advances in Intrusion Detection最新文献

英文 中文
Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors 基于多核处理器的网络入侵检测性能扩展
Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_5
Jaehyun Nam, M. Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park
{"title":"Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors","authors":"Jaehyun Nam, M. Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park","doi":"10.1007/978-3-319-26362-5_5","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_5","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123279055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware AppSpear:字节码解密和DEX重组包装Android恶意软件
Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_17
Wenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu
{"title":"AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware","authors":"Wenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu","doi":"10.1007/978-3-319-26362-5_17","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_17","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting 精英:弹性检测服务的自动编排,以确保云托管的安全
Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_27
Yangyi Chen, Vincent Bindschaedler, Xiaofeng Wang, Stefan Berger, D. Pendarakis
{"title":"Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting","authors":"Yangyi Chen, Vincent Bindschaedler, Xiaofeng Wang, Stefan Berger, D. Pendarakis","doi":"10.1007/978-3-319-26362-5_27","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_27","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware-Assisted Fine-Grained Code-Reuse Attack Detection 硬件辅助的细粒度代码重用攻击检测
Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_4
Pinghai Yuan, Qingkai Zeng, Xuhua Ding
{"title":"Hardware-Assisted Fine-Grained Code-Reuse Attack Detection","authors":"Pinghai Yuan, Qingkai Zeng, Xuhua Ding","doi":"10.1007/978-3-319-26362-5_4","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_4","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124699920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection 基于攻击注入的虚拟环境入侵检测系统评估
Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_22
Aleksandar Milenkoski, B. Payne, Nuno Antunes, M. Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft
{"title":"Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection","authors":"Aleksandar Milenkoski, B. Payne, Nuno Antunes, M. Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft","doi":"10.1007/978-3-319-26362-5_22","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_22","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129117601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Privacy Risk Assessment on Online Photos 网上照片私隐风险评估
Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_20
Haitao Xu, Haining Wang, A. Stavrou
{"title":"Privacy Risk Assessment on Online Photos","authors":"Haitao Xu, Haining Wang, A. Stavrou","doi":"10.1007/978-3-319-26362-5_20","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_20","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
WYSISNWIV: What You Scan Is Not What I Visit WYSISNWIV:你扫描的不是我访问的
Pub Date : 2015-11-02 DOI: 10.1007/978-3-319-26362-5_15
Q. Yang, D. Damopoulos, G. Portokalidis
{"title":"WYSISNWIV: What You Scan Is Not What I Visit","authors":"Q. Yang, D. Damopoulos, G. Portokalidis","doi":"10.1007/978-3-319-26362-5_15","DOIUrl":"https://doi.org/10.1007/978-3-319-26362-5_15","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133252759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild 一些漏洞是不同于其他的-研究漏洞和攻击面在野外
Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-11379-1_21
Kartik Nayak, Daniel Marino, P. Efstathopoulos, T. Dumitras
{"title":"Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild","authors":"Kartik Nayak, Daniel Marino, P. Efstathopoulos, T. Dumitras","doi":"10.1007/978-3-319-11379-1_21","DOIUrl":"https://doi.org/10.1007/978-3-319-11379-1_21","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging PillarBox:打击下一代恶意软件与快速前向安全日志
Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-11379-1_3
Kevin D. Bowers, Catherine Hart, A. Juels, Nikos Triandopoulos
{"title":"PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging","authors":"Kevin D. Bowers, Catherine Hart, A. Juels, Nikos Triandopoulos","doi":"10.1007/978-3-319-11379-1_3","DOIUrl":"https://doi.org/10.1007/978-3-319-11379-1_3","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126032474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
On Emulation-Based Network Intrusion Detection Systems 基于仿真的网络入侵检测系统研究
Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-11379-1_19
A. Abbasi, J. Wetzels, Wouter Bokslag, E. Zambon, S. Etalle
{"title":"On Emulation-Based Network Intrusion Detection Systems","authors":"A. Abbasi, J. Wetzels, Wouter Bokslag, E. Zambon, S. Etalle","doi":"10.1007/978-3-319-11379-1_19","DOIUrl":"https://doi.org/10.1007/978-3-319-11379-1_19","url":null,"abstract":"","PeriodicalId":431883,"journal":{"name":"International Symposium on Recent Advances in Intrusion Detection","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133620871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
International Symposium on Recent Advances in Intrusion Detection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1