499-014
|
Discovering Attack Structures using Behavior Driven Alert Correlation with Dynamic Visualization of Network Intrusions
A.Z. Rana, M.L. Huang, and T. Hintz (Australia)
|
Abstract
|
|
499-017
|
Token Buckets for Outgoing Spam Prevention
W.N. Gansterer, H. Hlavacs, M. Ilger, P. Lechner, and J. Strauβ (Austria)
|
Abstract
|
|
499-023
|
Preventing Information Leaks in Xwindows
V. Diwakara, V. Rajegowda, and P. Uppuluri (USA)
|
Abstract
|
|
499-030
|
Preventing Spam by Dynamically Obfuscating Email-Addresses
T. Eggendorfer and J. Keller (Germany)
|
Abstract
|
|
499-063
|
Characterizing and Estimating Network Fluctuation for Detecting Interactive Stepping-Stone Intrusion
J.H. Yang and S.-H.S. Huang (USA)
|
Abstract
|
|
499-069
|
LOHIT: An Online Detection & Control System for Cellular SMS Spam
S. Dixit, S. Gupta, and C.V. Ravishankar (USA)
|
Abstract
|
|
499-078
|
A Novel Service-Oriented and User-Centric Intrusion Detection System for Ubiquitous Networks
B. Zhou, Q. Shi, and M. Merabti (UK)
|
Abstract
|
|
499-801
|
Anomaly Detection in a Distributed Environment using Neural Networks on a Cluster
N. Srinivasan and V. Vaidehi (India)
|
Abstract
|
|
499-804
|
A Hierarchical
Approach for Detecting System Intrusions through Event Correlation
G.W. Rice and T.E. Daniels (USA)
|
Abstract
|
|
What are Digital Object Identifers?