找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Recent Advances in Intrusion Detection; 14th International S Robin Sommer,Davide Balzarotti,Gregor Maier Conference proceedings 2011 Spring

[复制链接]
楼主: Lipase
发表于 2025-3-23 10:11:00 | 显示全部楼层
0302-9743 l Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web sec
发表于 2025-3-23 15:14:02 | 显示全部楼层
Minemu: The World’s Fastest Taint Trackermance is significantly better than that of existing systems, despite the fact that we have not applied some of their optimizations yet. We believe that the new design may be suitable for certain classes of applications in production systems.
发表于 2025-3-23 20:15:18 | 显示全部楼层
Automated Identification of Cryptographic Primitives in Binary Programst characterize specific, unique aspects of cryptographic code. Our evaluation shows that these methods improve the state-of-the-art approaches in this area and that we can successfully extract cryptographic keys from a given malware binary.
发表于 2025-3-24 00:21:00 | 显示全部楼层
发表于 2025-3-24 03:36:13 | 显示全部楼层
Modeling User Search Behavior for Masquerade Detectionntal results show that modeling search behavior reliably detects all masqueraders with a very low false positive rate of 1.1%, far better than prior published results. The limited set of features used for search behavior modeling also results in large performance gains over the same modeling techniques that use larger sets of features.
发表于 2025-3-24 09:50:42 | 显示全部楼层
发表于 2025-3-24 14:15:47 | 显示全部楼层
发表于 2025-3-24 18:13:27 | 显示全部楼层
Conference proceedings 2011, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
发表于 2025-3-24 19:17:20 | 显示全部楼层
发表于 2025-3-25 00:06:08 | 显示全部楼层
: Tracking Dynamic Code Identitysuch as sealed storage and remote attestation. Unfortunately, there is a generally acknowledged limitation in the implementation of current code identity mechanisms in that they are fundamentally static. That is, code identity is captured at program load-time and, thus, does not reflect the dynamic
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-23 09:47
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表