Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Recent advances in intrusion detectionRecent advances in intrusion detection

Recent advances in intrusion detection

Magnus Almgren, Alfonso Valdes

About this book

Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15 - 17, 2004. Proceedings<br />Author: Erland Jonsson, Alfonso Valdes, Magnus Almgren<br /> Published by Springer Berlin Heidelberg<br /> ISBN: 978-3-540-23123-3<br /> DOI: 10.1007/b100714<br /><br />Table of Contents:<p></p><ul><li>Automatic Extraction of Accurate Application-Specific Sandboxing Policy </li><li>Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths </li><li>HoneyStat: Local Worm Detection Using Honeypots </li><li>Fast Detection of Scanning Worm Infections </li><li>Detecting Unknown Massive Mailing Viruses Using Proactive Methods </li><li>Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection </li><li>Attack Analysis and Detection for Ad Hoc Routing Protocols </li><li>On the Design and Use of Internet Sinks for Network Abuse Monitoring </li><li>Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information </li><li>Symantec Deception Server Experience with a Commercial Deception System </li><li>Anomalous Payload-Based Network Intrusion Detection </li><li>Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix </li><li>Seurat: A Pointillist Approach to Anomaly Detection </li><li>Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds </li><li>Formal Reasoning About Intrusion Detection Systems </li><li>RheoStat: Real-Time Risk Management</li></ul>

Details

OL Work ID
OL16967519W

Subjects

ComputersCongressesComputer securityAccess controlInformation technologyComputer networks, security measuresComputer scienceComputer networksOperating systems (Computers)Data encryption (Computer science)

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.