The SCEAS System
Navigation Menu

Conferences in DBLP

Detection of Intrusions and Malware & Vulnerability Assessment (dimva)
2007 (conf/dimva/2007)

  1. Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan
    Extensible Web Browser Security. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:1-19 [Conf]
  2. Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel
    On the Effectiveness of Techniques to Detect Phishing Sites. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:20-39 [Conf]
  3. Martin Johns, Justus Winter
    Protecting the Intranet Against "JavaScript Malware" and Related Attacks. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:40-59 [Conf]
  4. Eric Medvet, Alberto Bartoli
    On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:60-78 [Conf]
  5. Krzysztof M. Brzezinski
    Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:79-88 [Conf]
  6. Elizabeth Stinson, John C. Mitchell
    Characterizing Bots' Remote Control Behavior. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:89-108 [Conf]
  7. Jan Goebel, Thorsten Holz, Carsten Willems
    Measurement and Analysis of Autonomous Spreading Malware in a University Environment. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:109-128 [Conf]
  8. Bojan Zdrnja, Nevil Brownlee, Duane Wessels
    Passive Monitoring of DNS Anomalies. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:129-139 [Conf]
  9. Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
    Characterizing Dark DNS Behavior. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:140-156 [Conf]
  10. Min Gyung Kang, Juan Caballero, Dawn Song
    Distributed Evasive Scan Techniques and Countermeasures. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:157-174 [Conf]
  11. Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson
    On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:175-192 [Conf]
  12. David R. Piegdon, Lexi Pimenidis
    Targeting Physically Addressable Memory. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:193-212 [Conf]
  13. Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi
    Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:213-230 [Conf]
  14. Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis
    A Study of Malcode-Bearing Documents. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:231-250 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002