Author of the publication

Understanding Precision in Host Based Intrusion Detection.

, , , and . RAID, volume 4637 of Lecture Notes in Computer Science, page 21-41. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust and efficient malware analysis and host-based monitoring.. Georgia Institute of Technology, Atlanta, GA, USA, (2010)base-search.net (ftgeorgiatech:oai:smartech.gatech.edu:1853/37220).Simulating Internet Worms., , and . MASCOTS, page 268-274. IEEE Computer Society, (2004)Comparative Study between Analytical Models and Packet-Level Worm Simulations., , and . PADS, page 88-98. IEEE Computer Society, (2005)Secure in-VM monitoring using hardware virtualization., , , and . CCS, page 477-487. ACM, (2009)Impeding Malware Analysis Using Conditional Code Obfuscation., , , and . NDSS, The Internet Society, (2008)Automatic Reverse Engineering of Malware Emulators., , , and . SP, page 94-109. IEEE Computer Society, (2009)Ether: malware analysis via hardware virtualization extensions., , , and . CCS, page 51-62. ACM, (2008)K-Tracer: A System for Extracting Kernel Malware Behavior., , and . NDSS, The Internet Society, (2009)Understanding Precision in Host Based Intrusion Detection., , , and . RAID, volume 4637 of Lecture Notes in Computer Science, page 21-41. Springer, (2007)Eureka: A Framework for Enabling Static Malware Analysis., , , , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 481-500. Springer, (2008)