Contents
-
Publicly AvailableMastheadApril 1, 2012
-
Requires Authentication UnlicensedNetwork Attack Detection and DefenseLicensedApril 1, 2012
-
Requires Authentication UnlicensedCurrent Botnet-Techniques and CountermeasuresLicensedApril 1, 2012
-
Requires Authentication UnlicensedAn Empirical Analysis of Malware BlacklistsLicensedApril 1, 2012
-
Requires Authentication UnlicensedGeneralizing Behavioral Signatures for Detecting Unknown Malware Variants and Early WarningLicensedApril 1, 2012
-
Requires Authentication UnlicensedA Framework for Automated Identification of Attack Scenarios on IT InfrastructuresLicensedApril 1, 2012
-
Requires Authentication UnlicensedOn Network Monitoring for Intrusion DetectionLicensedApril 1, 2012
-
Requires Authentication UnlicensedAutomated Generation of Precise SignaturesLicensedApril 1, 2012
-
Requires Authentication UnlicensedModel-based Cyber Defense Situational AwarenessLicensedApril 1, 2012
-
Requires Authentication UnlicensedIntelligent Defense against Malicious JavaScript CodeLicensedApril 1, 2012
-
Requires Authentication UnlicensedDependable Embedded Systems & Software (DEEDS) – TU DarmstadtLicensedApril 1, 2012
-
Requires Authentication UnlicensedAlois Potton hat das WortLicensedApril 1, 2012