173
click to vote
ACSAC
15 years 8 months ago
2004 IEEE
Complementary security systems are widely deployed in networks to protect digital assets. Alert correlation is essential to understanding the security threats and taking appropria...
166
click to vote
ACSAC
15 years 8 months ago
2004 IEEE
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
161
click to vote
ACSAC
15 years 8 months ago
2004 IEEE
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
159
Voted
ACSAC
15 years 8 months ago
2004 IEEE 156
Voted
ACSAC
15 years 8 months ago
2004 IEEE
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
|