Collaborative Intrusion Prevention
暂无分享,去创建一个
[1] Peng Ning,et al. Automatic diagnosis and response to memory corruption vulnerabilities , 2005, CCS '05.
[2] Andreas Terzis,et al. Fast and Evasive Attacks: Highlighting the Challenges Ahead , 2006, RAID.
[3] Zhenkai Liang,et al. Fast and automated generation of attack signatures: a basis for building self-protecting servers , 2005, CCS '05.
[4] Angelos D. Keromytis,et al. Building a Reactive Immune System for Software Services , 2005, USENIX Annual Technical Conference, General Track.
[5] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[6] Aloysius K. Mok,et al. Detecting Unknown Massive Mailing Viruses Using Proactive Methods , 2004, RAID.
[7] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[8] David Brumley,et al. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software , 2006, NDSS.
[9] Mary K. Vernon,et al. Mapping Internet Sensors with Probe Response Attacks , 2005, USENIX Security Symposium.
[10] Aloysius K. Mok,et al. The LAIDS/LIDS framework for systematic IPS design , 2006, Fourth IEEE International Workshop on Information Assurance (IWIA'06).
[11] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[12] Angelos D. Keromytis,et al. Software Self-Healing Using Collaborative Application Communities , 2006, NDSS.
[13] Aloysius K. Mok,et al. On Random-Inspection-Based Intrusion Detection , 2005, RAID.