Zobrazeno 1 - 10
of 147
pro vyhledávání: '"Stolfo, S.J."'
Autor:
Hadziosmanovic, D., Simionato, L., Bolzoni, D., Zambon, E., Etalle, S., Balzarotti, D., Stolfo, S.J., Cova, M.
Publikováno v:
Research in attacks, intrusions, and defenses (15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings), 354-373
STARTPAGE=354;ENDPAGE=373;TITLE=Research in attacks, intrusions, and defenses (15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings)
Research in Attacks, Intrusions, and Defenses ISBN: 9783642333378
RAID
Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012), 354-373
STARTPAGE=354;ENDPAGE=373;TITLE=Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012)
STARTPAGE=354;ENDPAGE=373;TITLE=Research in attacks, intrusions, and defenses (15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings)
Research in Attacks, Intrusions, and Defenses ISBN: 9783642333378
RAID
Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012), 354-373
STARTPAGE=354;ENDPAGE=373;TITLE=Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012)
In recent years we have witnessed several complex and high-impact attacks specifically targeting "binary" protocols (RPC, Samba and, more recently, RDP). These attacks could not be detected by current --- signature-based --- detection solutions, whil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::15c398d49f6a75c4103d00198fd52700
https://research.tue.nl/nl/publications/8f798b2a-4de2-49a2-a51e-312c0a8dff2a
https://research.tue.nl/nl/publications/8f798b2a-4de2-49a2-a51e-312c0a8dff2a
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2011 IEEE International Conference on Technologies for Homeland Security (HST); 2011, p338-344, 7p
Publikováno v:
2011 First SysSec Workshop (SysSec); 2011, p119-122, 4p
Autor:
Keromytis, A.D., Stolfo, S.J., Junfeng Yang, Stavrou, A., Ghosh, A., Engler, D., Dacier, M., Elder, M., Kienzle, D.
Publikováno v:
2011 First SysSec Workshop (SysSec); 2011, p53-56, 4p
Publikováno v:
2010 IEEE International Conference on Technologies for Homeland Security (HST); 2010, p8-14, 7p
Publikováno v:
2009 Annual Computer Security Applications Conference; 2009, p3-12, 10p
Publikováno v:
2008 Annual Computer Security Applications Conference (ACSAC); 2008, p367-376, 10p
Publikováno v:
2008 IEEE Symposium on Security & Privacy (sp 2008); 2008, p81-95, 15p
Publikováno v:
CCNC 2006. 2006 3rd IEEE Consumer Communications & Networking Conference, 2006; 2006, p635-639, 5p