Author of the publication

Anomalous Payload-Based Worm Detection and Signature Generation.

, , and . RAID, volume 3858 of Lecture Notes in Computer Science, page 227-246. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Return Value Predictability Profiles for Self-healing., , , , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 152-166. Springer, (2008)Anomalous Payload-Based Worm Detection and Signature Generation., , and . RAID, volume 3858 of Lecture Notes in Computer Science, page 227-246. Springer, (2005)Intrusion and anomaly detection model exchange for mobile ad-hoc networks., , , and . CCNC, page 635-639. IEEE, (2006)Quantifying Application Behavior Space for Detection and Self-Healing, , , , and . CUCS-017-06. Columbia University, (2006)From STEM to SEAD: Speculative Execution for Automated Defense., , , and . USENIX Annual Technical Conference, page 219-232. USENIX, (2007)Casting out Demons: Sanitizing Training Data for Anomaly Sensors., , , , and . SP, page 81-95. IEEE Computer Society, (2008)Adaptive Anomaly Detection via Self-calibration and Dynamic Updating., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 41-60. Springer, (2009)Hunting for Problems with Artemis., , and . WASL, USENIX Association, (2008)Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes., , , and . AISec, page 39-46. ACM, (2009)